elastic / protections-artifacts
Temporal Dependencies

A temporal dependency occurs when developers change two or more files at the same time (i.e. they are a part of the same commit).


Files Most Frequently Changed Together (Top 50)

data...

Pairs # same commits # commits 1 # commits 2 latest commit
behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml
behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml
2 2 (100%) 9 (22%) 2025-05-08
behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml
behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml
2 9 (22%) 4 (50%) 2025-05-08
behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml
behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml
2 5 (40%) 9 (22%) 2025-05-08
behavior/rules/windows/lateral_movement_suspicious_process_execution_via_network_logon.toml
behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml
2 8 (25%) 4 (50%) 2025-05-02
behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml
behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml
2 2 (100%) 4 (50%) 2025-05-08
behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml
behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml
2 4 (50%) 7 (28%) 2025-05-08
behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml
behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml
2 2 (100%) 5 (40%) 2025-05-08
behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml
behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml
2 2 (100%) 7 (28%) 2025-05-08
behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml
behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml
2 9 (22%) 7 (28%) 2025-05-08
behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml
behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml
2 5 (40%) 4 (50%) 2025-05-08
behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml
behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml
2 5 (40%) 7 (28%) 2025-05-08
behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml
behavior/rules/linux/defense_evasion_linux_payload_decoded_and_decrypted_via_built_in_utility.toml
1 3 (33%) 3 (33%) 2025-04-29
behavior/rules/windows/defense_evasion_suspicious_memory_page_protection.toml
behavior/rules/macos/execution_execution_via_electron_child_process_node.js_module.toml
1 4 (25%) 4 (25%) 2025-04-29
behavior/rules/windows/defense_evasion_potential_evasion_with_hardware_breakpoints.toml
behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml
1 7 (14%) 2 (50%) 2025-04-29
behavior/rules/linux/persistence_suspicious_echo_execution.toml
behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml
1 10 (10%) 12 (8%) 2025-04-29
behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml
behavior/rules/linux/execution_suspicious_execution_from_foomatic_rip_or_cupsd_parent.toml
1 2 (50%) 5 (20%) 2025-04-29
behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml
behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml
1 2 (50%) 3 (33%) 2025-04-29
behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml
behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml
1 2 (50%) 5 (20%) 2025-04-29
behavior/rules/windows/defense_evasion_shellcode_execution_via_python_script.toml
behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml
1 4 (25%) 1 (100%) 2025-04-29
behavior/rules/windows/credential_access_remote_access_to_sensitive_registry_keys.toml
behavior/rules/windows/command_and_control_connection_to_webservice_by_a_signed_binary_proxy.toml
1 1 (100%) 12 (8%) 2025-04-29
behavior/rules/windows/defense_evasion_potential_shellcode_injection_via_a_webshell.toml
behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml
1 3 (33%) 9 (11%) 2025-04-29
behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml
behavior/rules/linux/command_and_control_file_downloaded_via_curl_or_wget_to_hidden_directory.toml
1 12 (8%) 5 (20%) 2025-04-29
behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml
behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml
1 3 (33%) 7 (14%) 2025-04-29
behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml
behavior/rules/linux/persistence_scheduled_job_executing_binary_in_unusual_location.toml
1 8 (12%) 4 (25%) 2025-04-29
behavior/rules/windows/impact_suspicious_file_rename_via_smb.toml
behavior/rules/macos/defense_evasion_suspicious_openssl_execution_via_macos_application.toml
1 2 (50%) 6 (16%) 2025-04-29
behavior/rules/windows/execution_suspicious_api_call_from_a_powershell_script.toml
behavior/rules/linux/persistence_systemd_execution_followed_by_network_connection.toml
1 4 (25%) 10 (10%) 2025-04-29
behavior/rules/windows/defense_evasion_potential_injection_via_module_stomping.toml
behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml
1 2 (50%) 2 (50%) 2025-04-29
behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml
behavior/rules/windows/defense_evasion_virtualalloc_api_call_from_an_unsigned_dll.toml
1 2 (50%) 6 (16%) 2025-04-29
behavior/rules/windows/persistence_office_application_startup_via_template_file_modification.toml
behavior/rules/linux/persistence_motd_execution_followed_by_egress_network_connection.toml
1 3 (33%) 6 (16%) 2025-04-29
behavior/rules/windows/execution_execution_via_obfuscated_windows_script.toml
behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml
1 2 (50%) 3 (33%) 2025-04-29
behavior/rules/windows/persistence_dual_persistence_via_startup_and_scheduled_task.toml
behavior/rules/windows/defense_evasion_windows_api_via_a_callback_function.toml
1 2 (50%) 3 (33%) 2025-04-29
behavior/rules/windows/defense_evasion_unbacked_shellcode_from_unsigned_module.toml
behavior/rules/windows/credential_access_lsass_access_attempt_via_ppl_bypass.toml
1 6 (16%) 7 (14%) 2025-04-29
behavior/rules/windows/persistence_registry_or_file_modification_from_suspicious_memory.toml
behavior/rules/windows/execution_potential_pentesting_powershell_script.toml
1 3 (33%) 3 (33%) 2025-04-29
behavior/rules/windows/defense_evasion_suspicious_powershell_console_history_deletion.toml
behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml
1 2 (50%) 1 (100%) 2025-04-29
behavior/rules/windows/defense_evasion_process_creation_from_backed_rwx_memory.toml
behavior/rules/linux/defense_evasion_shared_object_load_via_lolbin.toml
1 3 (33%) 4 (25%) 2025-04-29
behavior/rules/windows/execution_suspicious_command_shell_execution_via_windows_run.toml
behavior/rules/windows/defense_evasion_suspicious_remote_memory_allocation.toml
1 2 (50%) 8 (12%) 2025-04-29
behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml
behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml
1 8 (12%) 5 (20%) 2025-04-29
behavior/rules/windows/defense_evasion_potential_remote_code_injection.toml
behavior/rules/macos/collection_suspicious_image_creation_via_screencapture.toml
1 4 (25%) 1 (100%) 2025-04-29
behavior/rules/windows/execution_potential_pentesting_powershell_script.toml
behavior/rules/windows/defense_evasion_parallel_ntdll_loaded_from_unbacked_memory.toml
1 3 (33%) 3 (33%) 2025-04-29
behavior/rules/windows/defense_evasion_image_hollow_from_unusual_stack.toml
behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml
1 6 (16%) 3 (33%) 2025-04-29
behavior/rules/windows/defense_evasion_process_creation_with_unusual_mitigation.toml
behavior/rules/windows/credential_access_security_account_manager_(sam)_registry_access.toml
1 6 (16%) 5 (20%) 2025-04-29
behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml
behavior/rules/linux/defense_evasion_shared_object_injection_via_process_environment_variable.toml
1 4 (25%) 6 (16%) 2025-04-29
behavior/rules/windows/command_and_control_ingress_tool_transfer_via_powershell.toml
behavior/rules/linux/persistence_apt_package_manager_command_execution.toml
1 4 (25%) 6 (16%) 2025-04-29
behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml
behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml
1 2 (50%) 5 (20%) 2025-04-29
behavior/rules/windows/defense_evasion_remote_memory_write_to_trusted_target_process.toml
behavior/rules/linux/impact_potential_coin_miner_execution_via_shell.toml
1 3 (33%) 4 (25%) 2025-04-29
behavior/rules/windows/lateral_movement_execution_of_a_file_dropped_from_smb_via_services.toml
behavior/rules/linux/persistence_egress_network_connection_from_default_dpkg_directory.toml
1 2 (50%) 7 (14%) 2025-04-29
behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml
behavior/rules/linux/persistence_file_downloaded_to_suspicious_location_by_web_server.toml
1 2 (50%) 2 (50%) 2025-04-29
behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml
behavior/rules/macos/execution_temporary_binary_execution_via_osascript.toml
1 5 (20%) 1 (100%) 2025-04-29
behavior/rules/windows/privilege_escalation_interactive_logon_by_a_suspicious_process.toml
behavior/rules/windows/credential_access_access_to_browser_credentials_from_suspicious_memory.toml
1 5 (20%) 8 (12%) 2025-04-29
behavior/rules/windows/defense_evasion_protected_process_light_bypass_via_dll_tampering.toml
behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml
1 9 (11%) 4 (25%) 2025-04-29
Dependencies between files in same commits
The number on the lines shows the number of shared commits.
G [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml] [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml] [behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml] [behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml] [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml]--[behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml] 2 [behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] [behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml]--[behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] 2 [behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml] [behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml] [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml]--[behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml] 2 [behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] [behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] [behavior/rules/windows/defense_evasion_suspicious_windows_core_module_change.toml]--[behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] 2 [behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml]--[behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] 2 [behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml]--[behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] 2 [behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml]--[behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] 2 [behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml]--[behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml] 2 [behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml]--[behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] 2 [behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml]--[behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] 2 [behavior/rules/windows/lateral_movement_suspicious_process_execution_via_network_logon.toml] [behavior/rules/windows/lateral_movement_suspicious_process_execution_via_network_logon.toml] [behavior/rules/windows/lateral_movement_suspicious_process_execution_via_network_logon.toml]--[behavior/rules/windows/command_and_control_potential_remote_desktop_protocol_tunneling.toml] 2 [behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml] [behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml] [behavior/rules/linux/defense_evasion_linux_payload_decoded_and_decrypted_via_built_in_utility.toml] [behavior/rules/linux/defense_evasion_linux_payload_decoded_and_decrypted_via_built_in_utility.toml] [behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml]--[behavior/rules/linux/defense_evasion_linux_payload_decoded_and_decrypted_via_built_in_utility.toml] 1 [behavior/rules/windows/defense_evasion_suspicious_memory_page_protection.toml] [behavior/rules/windows/defense_evasion_suspicious_memory_page_protection.toml] [behavior/rules/macos/execution_execution_via_electron_child_process_node.js_module.toml] [behavior/rules/macos/execution_execution_via_electron_child_process_node.js_module.toml] [behavior/rules/windows/defense_evasion_suspicious_memory_page_protection.toml]--[behavior/rules/macos/execution_execution_via_electron_child_process_node.js_module.toml] 1 [behavior/rules/windows/defense_evasion_potential_evasion_with_hardware_breakpoints.toml] [behavior/rules/windows/defense_evasion_potential_evasion_with_hardware_breakpoints.toml] [behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml] [behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml] [behavior/rules/windows/defense_evasion_potential_evasion_with_hardware_breakpoints.toml]--[behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml] 1 [behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml] [behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml] [behavior/rules/windows/credential_access_failed_attempts_to_access_sensitive_files.toml]--[behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml] 1 [behavior/rules/linux/persistence_suspicious_echo_execution.toml] [behavior/rules/linux/persistence_suspicious_echo_execution.toml] [behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml] [behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml] [behavior/rules/linux/persistence_suspicious_echo_execution.toml]--[behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml] 1 [behavior/rules/linux/command_and_control_file_downloaded_via_curl_or_wget_to_hidden_directory.toml] [behavior/rules/linux/command_and_control_file_downloaded_via_curl_or_wget_to_hidden_directory.toml] [behavior/rules/linux/persistence_hidden_payload_executed_via_scheduled_job.toml]--[behavior/rules/linux/command_and_control_file_downloaded_via_curl_or_wget_to_hidden_directory.toml] 1 [behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml] [behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml] [behavior/rules/linux/execution_suspicious_execution_from_foomatic_rip_or_cupsd_parent.toml] [behavior/rules/linux/execution_suspicious_execution_from_foomatic_rip_or_cupsd_parent.toml] [behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml]--[behavior/rules/linux/execution_suspicious_execution_from_foomatic_rip_or_cupsd_parent.toml] 1 [behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml] [behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml] [behavior/rules/linux/persistence_suspicious_file_creation_via_web_server.toml]--[behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml] 1 [behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml] [behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml] [behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml] [behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml] [behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml]--[behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml] 1 [behavior/rules/windows/defense_evasion_virtualalloc_api_call_from_an_unsigned_dll.toml] [behavior/rules/windows/defense_evasion_virtualalloc_api_call_from_an_unsigned_dll.toml] [behavior/rules/windows/execution_suspicious_windows_script_base64_encoding.toml]--[behavior/rules/windows/defense_evasion_virtualalloc_api_call_from_an_unsigned_dll.toml] 1 [behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml]--[behavior/rules/linux/persistence_unusual_command_executed_by_web_server.toml] 1 [behavior/rules/windows/defense_evasion_shellcode_execution_via_python_script.toml] [behavior/rules/windows/defense_evasion_shellcode_execution_via_python_script.toml] [behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml] [behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml] [behavior/rules/windows/defense_evasion_shellcode_execution_via_python_script.toml]--[behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml] 1 [behavior/rules/windows/credential_access_remote_access_to_sensitive_registry_keys.toml] [behavior/rules/windows/credential_access_remote_access_to_sensitive_registry_keys.toml] [behavior/rules/windows/command_and_control_connection_to_webservice_by_a_signed_binary_proxy.toml] [behavior/rules/windows/command_and_control_connection_to_webservice_by_a_signed_binary_proxy.toml] [behavior/rules/windows/credential_access_remote_access_to_sensitive_registry_keys.toml]--[behavior/rules/windows/command_and_control_connection_to_webservice_by_a_signed_binary_proxy.toml] 1 [behavior/rules/windows/defense_evasion_potential_shellcode_injection_via_a_webshell.toml] [behavior/rules/windows/defense_evasion_potential_shellcode_injection_via_a_webshell.toml] [behavior/rules/windows/defense_evasion_potential_shellcode_injection_via_a_webshell.toml]--[behavior/rules/windows/defense_evasion_amsi_or_wldp_bypass_via_memory_patching.toml] 1 [behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml] [behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml] [behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml]--[behavior/rules/linux/defense_evasion_timestomping_detected_via_touch.toml] 1 [behavior/rules/linux/persistence_scheduled_job_executing_binary_in_unusual_location.toml] [behavior/rules/linux/persistence_scheduled_job_executing_binary_in_unusual_location.toml] [behavior/rules/windows/defense_evasion_suspicious_memory_protection_fluctuation.toml]--[behavior/rules/linux/persistence_scheduled_job_executing_binary_in_unusual_location.toml] 1 [behavior/rules/windows/impact_suspicious_file_rename_via_smb.toml] [behavior/rules/windows/impact_suspicious_file_rename_via_smb.toml] [behavior/rules/macos/defense_evasion_suspicious_openssl_execution_via_macos_application.toml] [behavior/rules/macos/defense_evasion_suspicious_openssl_execution_via_macos_application.toml] [behavior/rules/windows/impact_suspicious_file_rename_via_smb.toml]--[behavior/rules/macos/defense_evasion_suspicious_openssl_execution_via_macos_application.toml] 1 [behavior/rules/windows/execution_suspicious_api_call_from_a_powershell_script.toml] [behavior/rules/windows/execution_suspicious_api_call_from_a_powershell_script.toml] [behavior/rules/linux/persistence_systemd_execution_followed_by_network_connection.toml] [behavior/rules/linux/persistence_systemd_execution_followed_by_network_connection.toml] [behavior/rules/windows/execution_suspicious_api_call_from_a_powershell_script.toml]--[behavior/rules/linux/persistence_systemd_execution_followed_by_network_connection.toml] 1 [behavior/rules/windows/defense_evasion_potential_injection_via_module_stomping.toml] [behavior/rules/windows/defense_evasion_potential_injection_via_module_stomping.toml] [behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml] [behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml] [behavior/rules/windows/defense_evasion_potential_injection_via_module_stomping.toml]--[behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml] 1 [behavior/rules/linux/persistence_file_downloaded_to_suspicious_location_by_web_server.toml] [behavior/rules/linux/persistence_file_downloaded_to_suspicious_location_by_web_server.toml] [behavior/rules/windows/defense_evasion_attempt_to_hide_files_via_registry_modification.toml]--[behavior/rules/linux/persistence_file_downloaded_to_suspicious_location_by_web_server.toml] 1 [behavior/rules/windows/persistence_office_application_startup_via_template_file_modification.toml] [behavior/rules/windows/persistence_office_application_startup_via_template_file_modification.toml] [behavior/rules/linux/persistence_motd_execution_followed_by_egress_network_connection.toml] [behavior/rules/linux/persistence_motd_execution_followed_by_egress_network_connection.toml] [behavior/rules/windows/persistence_office_application_startup_via_template_file_modification.toml]--[behavior/rules/linux/persistence_motd_execution_followed_by_egress_network_connection.toml] 1 [behavior/rules/windows/execution_execution_via_obfuscated_windows_script.toml] [behavior/rules/windows/execution_execution_via_obfuscated_windows_script.toml] [behavior/rules/windows/execution_execution_via_obfuscated_windows_script.toml]--[behavior/rules/windows/defense_evasion_process_memory_write_to_a_non_child_process.toml] 1 [behavior/rules/windows/persistence_dual_persistence_via_startup_and_scheduled_task.toml] [behavior/rules/windows/persistence_dual_persistence_via_startup_and_scheduled_task.toml] [behavior/rules/windows/defense_evasion_windows_api_via_a_callback_function.toml] [behavior/rules/windows/defense_evasion_windows_api_via_a_callback_function.toml] [behavior/rules/windows/persistence_dual_persistence_via_startup_and_scheduled_task.toml]--[behavior/rules/windows/defense_evasion_windows_api_via_a_callback_function.toml] 1 [behavior/rules/windows/defense_evasion_unbacked_shellcode_from_unsigned_module.toml] [behavior/rules/windows/defense_evasion_unbacked_shellcode_from_unsigned_module.toml] [behavior/rules/windows/credential_access_lsass_access_attempt_via_ppl_bypass.toml] [behavior/rules/windows/credential_access_lsass_access_attempt_via_ppl_bypass.toml] [behavior/rules/windows/defense_evasion_unbacked_shellcode_from_unsigned_module.toml]--[behavior/rules/windows/credential_access_lsass_access_attempt_via_ppl_bypass.toml] 1 [behavior/rules/windows/persistence_registry_or_file_modification_from_suspicious_memory.toml] [behavior/rules/windows/persistence_registry_or_file_modification_from_suspicious_memory.toml] [behavior/rules/windows/execution_potential_pentesting_powershell_script.toml] [behavior/rules/windows/execution_potential_pentesting_powershell_script.toml] [behavior/rules/windows/persistence_registry_or_file_modification_from_suspicious_memory.toml]--[behavior/rules/windows/execution_potential_pentesting_powershell_script.toml] 1 [behavior/rules/windows/defense_evasion_parallel_ntdll_loaded_from_unbacked_memory.toml] [behavior/rules/windows/defense_evasion_parallel_ntdll_loaded_from_unbacked_memory.toml] [behavior/rules/windows/execution_potential_pentesting_powershell_script.toml]--[behavior/rules/windows/defense_evasion_parallel_ntdll_loaded_from_unbacked_memory.toml] 1 [behavior/rules/windows/defense_evasion_suspicious_powershell_console_history_deletion.toml] [behavior/rules/windows/defense_evasion_suspicious_powershell_console_history_deletion.toml] [behavior/rules/windows/defense_evasion_suspicious_powershell_console_history_deletion.toml]--[behavior/rules/windows/defense_evasion_com_to_.net_redirection_via_registry.toml] 1 [behavior/rules/windows/defense_evasion_process_creation_from_backed_rwx_memory.toml] [behavior/rules/windows/defense_evasion_process_creation_from_backed_rwx_memory.toml] [behavior/rules/linux/defense_evasion_shared_object_load_via_lolbin.toml] [behavior/rules/linux/defense_evasion_shared_object_load_via_lolbin.toml] [behavior/rules/windows/defense_evasion_process_creation_from_backed_rwx_memory.toml]--[behavior/rules/linux/defense_evasion_shared_object_load_via_lolbin.toml] 1 [behavior/rules/windows/execution_suspicious_command_shell_execution_via_windows_run.toml] [behavior/rules/windows/execution_suspicious_command_shell_execution_via_windows_run.toml] [behavior/rules/windows/defense_evasion_suspicious_remote_memory_allocation.toml] [behavior/rules/windows/defense_evasion_suspicious_remote_memory_allocation.toml] [behavior/rules/windows/execution_suspicious_command_shell_execution_via_windows_run.toml]--[behavior/rules/windows/defense_evasion_suspicious_remote_memory_allocation.toml] 1 [behavior/rules/windows/defense_evasion_potential_remote_code_injection.toml] [behavior/rules/windows/defense_evasion_potential_remote_code_injection.toml] [behavior/rules/macos/collection_suspicious_image_creation_via_screencapture.toml] [behavior/rules/macos/collection_suspicious_image_creation_via_screencapture.toml] [behavior/rules/windows/defense_evasion_potential_remote_code_injection.toml]--[behavior/rules/macos/collection_suspicious_image_creation_via_screencapture.toml] 1 [behavior/rules/windows/defense_evasion_image_hollow_from_unusual_stack.toml] [behavior/rules/windows/defense_evasion_image_hollow_from_unusual_stack.toml] [behavior/rules/windows/defense_evasion_image_hollow_from_unusual_stack.toml]--[behavior/rules/windows/credential_access_lsass_access_attempt_from_an_unsigned_executable.toml] 1 [behavior/rules/windows/defense_evasion_process_creation_with_unusual_mitigation.toml] [behavior/rules/windows/defense_evasion_process_creation_with_unusual_mitigation.toml] [behavior/rules/windows/credential_access_security_account_manager_(sam)_registry_access.toml] [behavior/rules/windows/credential_access_security_account_manager_(sam)_registry_access.toml] [behavior/rules/windows/defense_evasion_process_creation_with_unusual_mitigation.toml]--[behavior/rules/windows/credential_access_security_account_manager_(sam)_registry_access.toml] 1 [behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml] [behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml] [behavior/rules/linux/defense_evasion_shared_object_injection_via_process_environment_variable.toml] [behavior/rules/linux/defense_evasion_shared_object_injection_via_process_environment_variable.toml] [behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml]--[behavior/rules/linux/defense_evasion_shared_object_injection_via_process_environment_variable.toml] 1 [behavior/rules/windows/command_and_control_ingress_tool_transfer_via_powershell.toml] [behavior/rules/windows/command_and_control_ingress_tool_transfer_via_powershell.toml] [behavior/rules/linux/persistence_apt_package_manager_command_execution.toml] [behavior/rules/linux/persistence_apt_package_manager_command_execution.toml] [behavior/rules/windows/command_and_control_ingress_tool_transfer_via_powershell.toml]--[behavior/rules/linux/persistence_apt_package_manager_command_execution.toml] 1 [behavior/rules/macos/execution_temporary_binary_execution_via_osascript.toml] [behavior/rules/macos/execution_temporary_binary_execution_via_osascript.toml] [behavior/rules/windows/command_and_control_execution_from_suspicious_stack_trailing_bytes.toml]--[behavior/rules/macos/execution_temporary_binary_execution_via_osascript.toml] 1 [behavior/rules/windows/defense_evasion_remote_memory_write_to_trusted_target_process.toml] [behavior/rules/windows/defense_evasion_remote_memory_write_to_trusted_target_process.toml] [behavior/rules/linux/impact_potential_coin_miner_execution_via_shell.toml] [behavior/rules/linux/impact_potential_coin_miner_execution_via_shell.toml] [behavior/rules/windows/defense_evasion_remote_memory_write_to_trusted_target_process.toml]--[behavior/rules/linux/impact_potential_coin_miner_execution_via_shell.toml] 1 [behavior/rules/windows/lateral_movement_execution_of_a_file_dropped_from_smb_via_services.toml] [behavior/rules/windows/lateral_movement_execution_of_a_file_dropped_from_smb_via_services.toml] [behavior/rules/linux/persistence_egress_network_connection_from_default_dpkg_directory.toml] [behavior/rules/linux/persistence_egress_network_connection_from_default_dpkg_directory.toml] [behavior/rules/windows/lateral_movement_execution_of_a_file_dropped_from_smb_via_services.toml]--[behavior/rules/linux/persistence_egress_network_connection_from_default_dpkg_directory.toml] 1 [behavior/rules/windows/privilege_escalation_interactive_logon_by_a_suspicious_process.toml] [behavior/rules/windows/privilege_escalation_interactive_logon_by_a_suspicious_process.toml] [behavior/rules/windows/credential_access_access_to_browser_credentials_from_suspicious_memory.toml] [behavior/rules/windows/credential_access_access_to_browser_credentials_from_suspicious_memory.toml] [behavior/rules/windows/privilege_escalation_interactive_logon_by_a_suspicious_process.toml]--[behavior/rules/windows/credential_access_access_to_browser_credentials_from_suspicious_memory.toml] 1 [behavior/rules/windows/defense_evasion_protected_process_light_bypass_via_dll_tampering.toml] [behavior/rules/windows/defense_evasion_protected_process_light_bypass_via_dll_tampering.toml] [behavior/rules/windows/defense_evasion_protected_process_light_bypass_via_dll_tampering.toml]--[behavior/rules/windows/defense_evasion_potential_ntdll_memory_unhooking.toml] 1
Download: SVG DOT (open online Graphviz editor)

Open 2D force graph (file dependencies)... Open 3D force graph (file dependencies)...
Open 2D force graph (file dependencies with commits)... Open 3D force graph (file dependencies with commits)...
Dependencies between components in same commits (primary)
The number on the lines shows the number of shared commits.