Merge branch '7.9' into main

This commit is contained in:
brokensound77
2020-08-27 15:54:44 -08:00
76 changed files with 225 additions and 150 deletions
@@ -17,6 +17,7 @@ false_positives = [
troubleshooting.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
Adversaries may attempt to disable the iptables or firewall service in an attempt to affect how a host is allowed to
receive or send network traffic.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
Adversaries may attempt to disable the syslog service in an attempt to an attempt to disrupt event logging and evade
detection by security controls.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
filtered by the process executable or username values.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
filtered by the process executable or username values.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
Adversaries may attempt to clear the bash command line history in an attempt to evade detection or forensic
investigations.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "lucene"
license = "Elastic License"
@@ -11,6 +11,7 @@ Identifies potential attempts to disable Security-Enhanced Linux (SELinux), whic
support access control policies. Adversaries may disable security tools to avoid possible detection of their tools and
activities.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -11,6 +11,7 @@ Malware or other files dropped or created on a system by an adversary may leave
a network and how. Adversaries may remove these files over the course of an intrusion to keep their footprint low or
remove them at the end as part of the post-intrusion cleanup process.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -16,6 +16,7 @@ false_positives = [
by username.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
filtered by the process executable or username values.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -17,6 +17,7 @@ false_positives = [
behavior. These events can be filtered by the process arguments, username, or process name values.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "lucene"
license = "Elastic License"
@@ -17,6 +17,7 @@ false_positives = [
Note that some Linux distributions are not built to support the removal of modules at all.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -17,6 +17,7 @@ false_positives = [
by ordinary users is uncommon. These can be exempted by process name or username.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -17,6 +17,7 @@ false_positives = [
process arguments to eliminate potential noise.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -16,6 +16,7 @@ false_positives = [
automation tools and frameworks.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
Identifies when a terminal (tty) is spawned via Perl. Attackers may upgrade a simple reverse shell to a fully
interactive tty after obtaining initial access to a host.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
Identifies when a terminal (tty) is spawned via Python. Attackers may upgrade a simple reverse shell to a fully
interactive tty after obtaining initial access to a host.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -18,6 +18,7 @@ false_positives = [
suspicious.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -18,6 +18,7 @@ false_positives = [
suspicious.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -16,6 +16,7 @@ false_positives = [
uncommon.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -16,6 +16,7 @@ false_positives = [
uncommon.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -16,6 +16,7 @@ false_positives = [
scripts, automation tools, and frameworks. Usage by web servers is more likely to be suspicious.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -18,6 +18,7 @@ false_positives = [
originate from scripts, automation tools, and frameworks.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -18,6 +18,7 @@ false_positives = [
uncommon.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -16,6 +16,7 @@ false_positives = [
is usually not routine or unannounced. Use of `Nping` by non-engineers or ordinary users is uncommon.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
username.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -17,6 +17,7 @@ false_positives = [
more likely to be suspicious.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
+1
View File
@@ -16,6 +16,7 @@ false_positives = [
originate from developers or SREs engaged in debugging or system call tracing.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
programs by ordinary users is uncommon.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -13,6 +13,7 @@ false_positives = [
behavior.
""",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"
@@ -12,6 +12,7 @@ group. An adversary can take advantage of this to either do a shell escape or ex
with the setgid bit to get code running in a different users context. Additionally, adversaries can use this mechanism
on their own malware to make sure they're able to execute in elevated contexts in the future.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "lucene"
license = "Elastic License"
@@ -12,6 +12,7 @@ user. An adversary can take advantage of this to either do a shell escape or exp
with the setuid bit to get code running in a different users context. Additionally, adversaries can use this mechanism
on their own malware to make sure they're able to execute in elevated contexts in the future.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "lucene"
license = "Elastic License"
@@ -10,6 +10,7 @@ description = """
A sudoers file specifies the commands that users or groups can run and from which terminals. Adversaries can take
advantage of these configurations to execute commands as other users or spawn processes with higher privileges.
"""
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License"