Isai
09ea35f33a
[New Rule] AWS STS AssumeRole with New MFA Device [Rule Tuning] AWS IAM Deactivation of MFA Device ( #4210 )
...
* [New Rule] [Rule Tuning] AWS STS AssumeRole with New MFA Device, AWS IAM Deactivation of MFA Device
New terms rule for new MFA device with AssumeRole action. Rule tuning to add MITRE technique to "AWS IAM Deactivation of MFA Device"
* add serialNumber to non-ecs schema file
* fixed misspelled toml file name
* Update rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2024-11-05 02:09:05 -05:00
Jonhnathan
2b6116e0ce
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 3 ( #4222 )
2024-11-04 11:55:04 -03:00
Jonhnathan
80841b5619
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 2 ( #4221 )
...
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 2
* Update rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
---------
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
2024-11-04 11:47:43 -03:00
Jonhnathan
81292aee8a
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 1 ( #4220 )
...
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 1
* Update Integrations unit tests
* Update test_all_rules.py
2024-11-04 11:32:22 -03:00
Eric Forte
581ef73bc0
[FR] [DAC] Add id support ( #4208 )
2024-11-01 07:47:34 -04:00
Isai
b6847c7a48
[New Rule] AWS STS Role Chaining ( #4209 )
...
* [New Rule] AWS STS Role Chaining
Identifies role chaining activity. Role chaining is when you use one assumed role to assume a second role through the AWS CLI or API.
While this a recognized functionality in AWS, role chaining can be abused for privilege escalation if the subsequent assumed role provides additional privileges.
Role chaining can also be used as a persistence mechanism as each AssumeRole action results in a refreshed session token with a 1 hour maximum duration.
This rule looks for role chaining activity happening within a single account, to eliminate false positives produced by common cross-account behavior.
* adding metadata query fields
* removing index field
2024-10-30 12:18:04 -04:00
protections machine
1278c27967
Sync RTA Attempt to Fix Sensor Regex Error ( #4213 )
2024-10-28 22:50:12 +05:30
github-actions[bot]
5d2940fa7c
Lock versions for releases: 8.10,8.11,8.12,8.13,8.14,8.15 ( #4217 )
2024-10-28 21:07:46 +05:30
shashank-elastic
123e090e7d
Fix Minstack version for windows integration - Pahse 2 ( #4216 )
2024-10-28 20:25:02 +05:30
shashank-elastic
92fe46b8ff
Fix Minstack version for windows integration ( #4214 )
2024-10-28 19:28:10 +05:30
Ruben Groenewoud
9e4fce6586
[Rule Tuning] Potential Linux Hack Tool Launched ( #4191 )
2024-10-25 17:23:48 +02:00
Ruben Groenewoud
b0bba39007
[Rule Tuning] Linux User Added to Privileged Group ( #4206 )
2024-10-25 14:21:20 +02:00
protections machine
5d9b295bb6
Sync RTA Potential Mining Pool Command Detection ( #4204 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-24 21:47:17 +05:30
protections machine
ae2adc766d
Sync RTA Renice or Ulimit Execution from Unusual Parent ( #4203 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-24 21:38:49 +05:30
protections machine
4d41496e1d
Sync RTA Linux Powershell Egress Network Connection ( #4202 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-24 20:35:15 +05:30
protections machine
933020a5c1
Sync RTA Suspicious Execution from Foomatic-rip or Cupsd Parent ( #4201 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-24 19:49:15 +05:30
protections machine
6ec5c5b04b
Sync RTA Foomatic-rip Shell Execution ( #4200 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-24 19:13:38 +05:30
shashank-elastic
be656ae740
Tune Bedrock rule to accept multivalued column ( #4205 )
2024-10-23 20:48:56 +05:30
protections machine
77f0ee85d9
react_sync_rta_updates_4215 Network Connection by Foomatic-rip Child ( #4196 )
2024-10-23 19:18:36 +05:30
protections machine
a54f83981e
Sync RTA File Downloaded via Curl or Wget to Hidden Directory ( #4197 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 19:01:17 +05:30
protections machine
0ef122632e
Sync RTA Shared Object Load via LoLBin ( #4198 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 18:48:11 +05:30
protections machine
f8d08f92f3
Sync RTA Suspicious Kernel Feature Activity ( #4199 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 18:40:21 +05:30
protections machine
faafc4f19d
Sync RTA Potential Proxy Execution via PHP ( #4195 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 16:07:32 +05:30
protections machine
c336e30dee
Sync RTA Suspicious Download and Redirect by Web Server ( #4194 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 15:55:10 +05:30
protections machine
6a740a6a61
Sync RTA File Downloaded and Piped to Interpreter by Web Server ( #4193 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 15:45:45 +05:30
protections machine
c5b108400c
Sync RTA File Downloaded from Suspicious Source by Web Server ( #4192 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 15:15:56 +05:30
protections machine
91fbc39084
Sync RTA MSR Write Access Enabled ( #4189 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 14:13:47 +05:30
protections machine
21c45f97fe
Sync RTA Reverse or Bind Shell via Suspicious Utility ( #4187 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 13:37:44 +05:30
protections machine
9cb2974e70
Sync RTA Potential Gsocket Activity ( #4186 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 13:21:33 +05:30
protections machine
fe6459d784
Sync RTA Bind Shell via Socket ( #4185 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 12:10:45 +05:30
protections machine
08fc5a5e35
Sync RTA Bind Shell via Node ( #4184 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 11:43:10 +05:30
protections machine
fb963628f2
Sync RTA Potential Proxy Execution via Sed ( #4183 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 11:31:10 +05:30
protections machine
6d430be209
Sync RTA Bind Shell via Netcat Traditional ( #4182 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 11:23:12 +05:30
protections machine
2e1daeeaa0
Sync RTA Base64 Shebang Payload Decoded via Built-in Utility ( #4181 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 11:12:43 +05:30
protections machine
31d3b6417b
Sync RTA Potential Proxy Execution via Tcpdump ( #4180 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 11:00:09 +05:30
protections machine
3e1fe91a1c
Sync RTA Potential Proxy Execution via Sysctl ( #4179 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 10:52:28 +05:30
protections machine
519a3688c8
Sync RTA Potential Proxy Execution via Split ( #4178 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 10:37:38 +05:30
protections machine
fff957c0f5
Sync RTA Potential Proxy Execution via Pidstat ( #4177 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 10:27:11 +05:30
protections machine
bc821f56e1
Sync RTA System Binary Proxy Execution via ld.so ( #4176 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-23 10:12:44 +05:30
protections machine
fb4bc72607
Sync RTA Potential Proxy Execution via Crash ( #4175 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-22 21:49:13 +05:30
protections machine
d1f44270e1
Sync RTA Potential Process Masquerading via Exec
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-10-22 21:41:27 +05:30
shashank-elastic
275c7288a3
Add testcase to check for related_integrations based on index ( #4096 )
2024-10-22 00:17:30 +05:30
Terrance DeJesus
d0225c37df
[Rule Tuning] Tuning 'Unusual Instance Metadata Service (IMDS) API Request' ( #4169 )
...
* tuning 'Unusual Instance Metadata Service (IMDS) API Request'
* added missing bracket
* linted
* Update rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml
* removed intelephense whitelisting
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2024-10-18 11:50:57 -04:00
Ruben Groenewoud
42f6c8f9a5
[Rule Tuning] Q2 Linux DR Tuning - Part 4 ( #4165 )
2024-10-18 17:13:44 +02:00
Ruben Groenewoud
b309bcb7ae
[Rule Tuning] Q2 Linux DR Tuning - Part 5 ( #4166 )
...
* [Rule Tuning] Q2 Linux DR Tuning - Part 5
* Update persistence_suspicious_ssh_execution_xzbackdoor.toml
* Update persistence_rpm_package_installation_from_unusual_parent.toml
2024-10-18 17:02:26 +02:00
Ruben Groenewoud
601254488b
[BBR Promotion] Q2 Linux BBR Promotion ( #4172 )
...
* [BBR Promotion] Q2 Linux BBR Promotion
* Update collection_linux_clipboard_activity.toml
* Update defense_evasion_creation_of_hidden_files_directories.toml
2024-10-18 16:55:09 +02:00
Ruben Groenewoud
592ad0fe9a
[Rule Tuning] Q2 Linux DR Tuning - BBR ( #4171 )
...
* [Rule Tuning] Q2 Linux DR Tuning - BBR
* Update discovery_kernel_module_enumeration_via_proc.toml
* Update discovery_linux_modprobe_enumeration.toml
* Update discovery_linux_sysctl_enumeration.toml
* Update discovery_potential_memory_seeking_activity.toml
* Update discovery_potential_memory_seeking_activity.toml
2024-10-18 16:45:23 +02:00
Ruben Groenewoud
09bd4cef16
[Rule Tuning] Q2 Linux DR Tuning - CP ( #4170 )
...
* [Rule Tuning] Q2 Linux DR Tuning - CP
* Update command_and_control_non_standard_ssh_port.toml
2024-10-18 16:38:14 +02:00
Ruben Groenewoud
ac6a49eeea
[Rule Tuning] Q2 Linux DR Tuning - Part 6 ( #4167 )
2024-10-18 16:25:54 +02:00
Ruben Groenewoud
39fc23cb3d
[Rule Tuning] Q2 Linux DR Tuning - Part 3 ( #4164 )
...
* [Rule Tuning] Q2 Linux DR Tuning - Part 3
* Update execution_suspicious_executable_running_system_commands.toml
2024-10-18 16:18:14 +02:00