[Rule Tuning] Feedback from 7.12 Kibana PR (#942)
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2021/01/19"
|
||||
maturity = "production"
|
||||
updated_date = "2021/01/19"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -26,7 +26,7 @@ process where event.type in ("start", "process_started") and
|
||||
process.name : ("sh", "bash", "dash", "ksh", "tcsh", "zsh", "curl", "wget") and
|
||||
process.args : "-jar" and process.args : "*.jar" and
|
||||
/* Add any FP's here */
|
||||
not process.executable : "/Users/*/.sdkman/*" and
|
||||
not process.executable : ("/Users/*/.sdkman/*", "/Library/Java/JavaVirtualMachines/*") and
|
||||
not process.args : ("/usr/local/*", "/Users/*/github.com/*", "/Users/*/src/*")
|
||||
'''
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2021/02/03"
|
||||
maturity = "production"
|
||||
updated_date = "2021/02/04"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -11,7 +11,7 @@ Identifies the attempted use of a heap-based buffer overflow vulnerability for t
|
||||
"""
|
||||
false_positives = [
|
||||
"""
|
||||
This rule could generate false positives if the process arguments leveraged by the expoit are shared by custom
|
||||
This rule could generate false positives if the process arguments leveraged by the exploit are shared by custom
|
||||
scripts using the Sudo or Sudoedit binaries. Only Sudo versions 1.8.2 through 1.8.31p2 and 1.9.0 through 1.9.5p1 are
|
||||
affected; if those versions are not present on the endpoint, this could be a false positive.
|
||||
""",
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/05/04"
|
||||
maturity = "production"
|
||||
updated_date = "2021/02/04"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -23,11 +23,11 @@ type = "eql"
|
||||
query = '''
|
||||
process where event.type in ("start", "process_started") and
|
||||
(
|
||||
(process.name : ("rm", "echo") and process.args : (".bash_history", "/root/.bash_history", "/home/*/.bash_history")) or
|
||||
(process.args : ("rm", "echo") and process.args : (".bash_history", "/root/.bash_history", "/home/*/.bash_history")) or
|
||||
(process.name : "history" and process.args : "-c") or
|
||||
(process.name : "export" and process.args : ("HISTFILE=/dev/null", "HISTFILESIZE=0")) or
|
||||
(process.name : "unset" and process.args : "HISTFILE") or
|
||||
(process.name : "set" and process.args : "history" and process.args : "+o")
|
||||
(process.args : "export" and process.args : ("HISTFILE=/dev/null", "HISTFILESIZE=0")) or
|
||||
(process.args : "unset" and process.args : "HISTFILE") or
|
||||
(process.args : "set" and process.args : "history" and process.args : "+o")
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/01/04"
|
||||
maturity = "production"
|
||||
updated_date = "2020/01/04"
|
||||
updated_date = "2020/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -13,7 +13,7 @@ from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "eql"
|
||||
license = "Elastic License"
|
||||
name = "Browser Credential File Access"
|
||||
name = "Access of Stored Browser Credentials"
|
||||
references = ["https://securelist.com/calisto-trojan-for-macos/86543/"]
|
||||
risk_score = 73
|
||||
rule_id = "20457e4f-d1de-4b92-ae69-142e27a4342a"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/01/07"
|
||||
maturity = "production"
|
||||
updated_date = "2020/01/07"
|
||||
updated_date = "2020/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -14,7 +14,7 @@ from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License"
|
||||
name = "SystemKey Access via Hexdump"
|
||||
name = "SystemKey Access via Command Line"
|
||||
references = ["https://github.com/AlessandroZ/LaZagne/blob/master/Mac/lazagne/softwares/system/chainbreaker.py"]
|
||||
risk_score = 73
|
||||
rule_id = "d75991f2-b989-419d-b797-ac1e54ec2d61"
|
||||
@@ -24,7 +24,7 @@ type = "query"
|
||||
|
||||
query = '''
|
||||
event.category:process and event.type:(start or process_started) and
|
||||
process.name:hexdump and process.args:"/private/var/db/SystemKey"
|
||||
process.args:"/private/var/db/SystemKey"
|
||||
'''
|
||||
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2021/01/13"
|
||||
maturity = "production"
|
||||
updated_date = "2021/01/13"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -11,7 +11,7 @@ and control servers. Root certificates are used in public key cryptography to id
|
||||
(CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of
|
||||
trust that have been signed by the root certificate.
|
||||
"""
|
||||
false_positives = ["Trusted Root Certificate Install"]
|
||||
false_positives = ["Certain applications may install root certificates for the purpose of inspecting SSL traffic."]
|
||||
from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "kuery"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2021/01/13"
|
||||
maturity = "production"
|
||||
updated_date = "2021/01/13"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -10,7 +10,6 @@ Identifies the creation or modification of a DirectoryService PlugIns (dsplug) f
|
||||
on each system boot and automatically reloads after crash. It scans and executes bundles that are located in the
|
||||
DirectoryServices PlugIns folder and can be abused by adversaries to maintain persistence.
|
||||
"""
|
||||
false_positives = ["Trusted DirectoryService PlugIns"]
|
||||
from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "kuery"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/12/23"
|
||||
maturity = "production"
|
||||
updated_date = "2020/12/23"
|
||||
updated_date = "2020/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -9,7 +9,6 @@ description = """
|
||||
Adversaries may create or modify the Sublime application plugins or scripts to execute a malicious payload each time
|
||||
the Sublime application is started.
|
||||
"""
|
||||
false_positives = ["Legitimate Sublime plugins or application updates"]
|
||||
from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "eql"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2021/01/27"
|
||||
maturity = "production"
|
||||
updated_date = "2021/01/27"
|
||||
updated_date = "2021/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -13,7 +13,7 @@ from = "now-9m"
|
||||
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License"
|
||||
name = "Potential Privilege Escalation via Root Crontab File Modification"
|
||||
name = "Privilege Escalation via Root Crontab File Modification"
|
||||
references = [
|
||||
"https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc",
|
||||
"https://www.exploit-db.com/exploits/42146",
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/11/23"
|
||||
maturity = "production"
|
||||
updated_date = "2020/01/28"
|
||||
updated_date = "2020/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -24,8 +24,7 @@ query = '''
|
||||
process where event.type in ("start", "process_started") and
|
||||
process.pe.original_file_name == "reg.exe" and
|
||||
process.args : ("save", "export") and
|
||||
process.args : ("hklm\\sam", "hklm\\security") and
|
||||
not process.parent.executable : "C:\\Program Files*\\Rapid7\\Insight Agent\\components\\insight_agent\\*\\ir_agent.exe"
|
||||
process.args : ("hklm\\sam", "hklm\\security")
|
||||
'''
|
||||
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/12/04"
|
||||
maturity = "production"
|
||||
updated_date = "2020/01/28"
|
||||
updated_date = "2020/02/11"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -9,6 +9,13 @@ description = """
|
||||
Enumeration of files and directories using built-in tools. Adversaries may use the information discovered to plan
|
||||
follow-on activity.
|
||||
"""
|
||||
false_positives = [
|
||||
"""
|
||||
Enumeration of files and directories may not be inherently malicious and noise may come from scripts, automation
|
||||
tools, or normal command line usage. It's important to baseline your environment to determine the amount of expected
|
||||
noise and exclude any known FP's from the rule.
|
||||
""",
|
||||
]
|
||||
index = ["logs-endpoint.events.*", "winlogbeat-*", "logs-windows.*"]
|
||||
language = "eql"
|
||||
license = "Elastic License"
|
||||
@@ -20,9 +27,16 @@ tags = ["Elastic", "Host", "Windows", "Threat Detection", "Discovery"]
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where event.type in ("start", "process_started") and
|
||||
(process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and
|
||||
process.args : ("dir", "tree")
|
||||
sequence by agent.id, user.name with maxspan=1m
|
||||
[process where event.type in ("start", "process_started") and
|
||||
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
|
||||
process.name : "tree.com"]
|
||||
[process where event.type in ("start", "process_started") and
|
||||
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
|
||||
process.name : "tree.com"]
|
||||
[process where event.type in ("start", "process_started") and
|
||||
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
|
||||
process.name : "tree.com"]
|
||||
'''
|
||||
|
||||
|
||||
@@ -38,4 +52,3 @@ reference = "https://attack.mitre.org/techniques/T1083/"
|
||||
id = "TA0007"
|
||||
name = "Discovery"
|
||||
reference = "https://attack.mitre.org/tactics/TA0007/"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user