Commit Graph

2087 Commits

Author SHA1 Message Date
Ruben Groenewoud 1c404b7861 [New Rule] DNF Package Manager Plugin File Creation (#3822)
* [New Rule] DNF Package Manager Plugin File Creation

* Update persistence_dnf_package_manager_plugin_file_creation.toml

(cherry picked from commit f33c25b118)
2024-06-28 09:18:02 +00:00
Ruben Groenewoud 1dad651fcc [New Rules] rc.local Execution Rules (#3813)
* [New Rules] rc.local Execution Rules

* ++

* Update rules/linux/persistence_rc_local_error_via_syslog.toml

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

(cherry picked from commit edc501accf)
2024-06-28 08:02:25 +00:00
Samirbous 96060d50fa Update defense_evasion_microsoft_defender_tampering.toml (#3840)
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

(cherry picked from commit b97069c3e9)
2024-06-28 07:19:18 +00:00
Isai a3eae479ff [New BBR] AWS RDS DB Snapshot Created (#3828)
* [New BBR] AWS RDS DB Snapshot Created

...

* Squashed commit of the following:

commit 6746a421c4
Author: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Date:   Tue Jun 25 16:14:28 2024 +0200

    [New Rules] Yum Plugin Creation / Discovery (#3820)

    * [New Rules] Yum Plugin Creation / Discovery

    * Update discovery_yum_plugin_detection.toml

    * Update and rename discovery_yum_plugin_detection.toml to discovery_yum_dnf_plugin_detection.toml

commit 632e169f7a
Author: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Date:   Tue Jun 25 09:35:36 2024 -0400

    [Hunt Tuning] Add Descriptions, Collapse Queries and Re-Generate Docs (#3791)

    * add description to hunting schema; change queries to be a list

    * update createremotethreat by process hunt

    * update dll hijack and masquerading as MSFT library

    * remove sysmon specific dDLL hijack via masquerading MSFT library

    * updated Masquerading Attempts as Native Windows Binaries

    * updates Rare DLL Side-Loading by Occurrence

    * updates Rare LSASS Process Access Attempts

    * update DNS Queries via LOLBins with Low Occurence Frequency

    * updated Low Occurrence of Drivers Loaded on Unique Hosts

    * updates Excessive RDP Network Activity by Host and User

    * updates Excessive SMB Network Activity by Process ID

    * updated Executable File Creation by an Unusual Microsoft Binary

    * Frequency of Process Execution and Network Logon by Source Address

    * updates Frequency of Process Execution and Network Logon by Source Address

    * updated Execution via Remote Services by Client Address

    * updated Startup Execution with Low Occurrence Frequency by Unique Host

    * updated Low Frequency of Process Execution via WMI by Unique Agent

    * updated Low Frequency of Process Execution via Windows Scheduled Task by Unique Agent

    * updated Low Occurence of Process Execution via Windows Services with Unique Agent

    * Updated High Count of Network Connection Over Extended Period by Process

    * update Libraries Loaded by svchost with Low Occurrence Frequency

    * updated Microsoft Office Child Processes with Low Occurrence Frequency by Unique Agent

    * updated Network Discovery via Sensitive Ports by Unusual Process

    * updated PE File Transfer via SMB_Admin Shares by Agent or User

    * updated Persistence via Run Key with Low Occurrence Frequency

    * updates Persistence via Startup with Low Occurrence Frequency by Unique Host

    * updates "Persistence via Run Key with Low Occurrence Frequency"; adjusted file names to remove data source

    * updates "Low Occurrence of Suspicious Launch Agent or Launch Daemon"

    * updates "Egress Network Connections with Total Bytes Greater than Threshold"

    * updates "Rundll32 Execution Aggregated by Command Line"

    * updates "Scheduled tasks Creation by Action via Registry"

    * updates "Scheduled Tasks Creation for Unique Hosts by Task Command"

    * updates "Suspicious Base64 Encoded Powershell Command"

    * updates "Suspicious DNS TXT Record Lookups by Process"

    * updates "Unique Windows Services Creation by Service File Name"

    * Updates "Unique Windows Services Creation by Service File Name"

    * updates "Windows Command and Scripting Interpreter from Unusual Parent Process"

    * updates "Windows Logon Activity by Source IP"

    * updates "Suspicious Network Connections by Unsigned Mach-O"

    * updates LLM hunting queries

    * re-generated markdown files; updated generate markdown py file

    * updated test_hunt_data

    * Update hunting/macos/queries/suspicious_network_connections_by_unsigned_macho.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/drivers_load_with_low_occurrence_frequency.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/domain_names_queried_via_lolbins_and_with_low_occurence_frequency.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * updated missing integrations

    * updated MD docs according to recent hunting changes

    * Update hunting/windows/queries/executable_file_creation_by_an_unusual_microsoft_binary.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_rare_dll_sideload_by_occurrence.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_masquerading_attempts_as_native_windows_binaries.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/llm/queries/aws_bedrock_dos_resource_exhaustion_detection.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * added enrichment policy link to rule

    * Update hunting/windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/rundll32_execution_aggregated_by_cmdline.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/index.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    ---------

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

commit 6f43d1f535
Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Date:   Tue Jun 25 17:58:37 2024 +0530

    Lock versions for releases: 8.9,8.10,8.11,8.12,8.13,8.14 (#3821)

commit 0726ce41bf
Author: James Valente <65730960+jvalente-salemstate@users.noreply.github.com>
Date:   Tue Jun 25 07:22:07 2024 -0400

    Tune rule to exclude forwarded events. (#3790)

    Events containing "forwarded" as a tag may include host information
    that is not related to the host running elastic agent. This triggers
    false positive alerts. Examples include Entity Analytics integrations,
    Palo Alto GlobalProtect activity, and M365 Defender device events.

    Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

commit 2708a89f20
Author: Isai <59296946+imays11@users.noreply.github.com>
Date:   Tue Jun 25 00:11:48 2024 -0400

    [New Rule] AWS IAM User Created Access Keys for Another User (#3788)

    * [New Rule] AWS IAM User Created Access Keys for Another User

    ...

    * updated min_stack and removed index field

    * reversed tactic order

    * added AWS documentation as reference

    * Apply suggestions from code review

    updated_date, query format change, removed keep from query

commit da8f3e4880
Author: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Date:   Fri Jun 21 13:11:23 2024 -0400

    [New Rule] Okta Credential Stuffing and Password Spraying Identification via Source, Device Token and Actor (#3797)

    * adding new rule 'Multiple Okta User Authentication Events with Same Device Token Hash'

    * adding new rule 'Multiple Okta User Authentication Events with Client Address'

    * updating UUIDs

    * removed indexes

    * adding new rule 'High Number of Okta Device Token Cookies Generated for Authentication'

    * added okta outcome reason 'INVALID_CREDENTIALS' to queries

    * updated risk score

    * made all rules low risk score

    * added user session start to rule

    * updated min-stack comments

commit a131e021ed
Author: Mika Ayenson <Mika.ayenson@elastic.co>
Date:   Fri Jun 21 11:05:57 2024 -0500

    Revert "Test case to check updated_date (#3764)"

    This reverts commit 7621a54fcc.

commit 7621a54fcc
Author: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Date:   Fri Jun 21 18:43:32 2024 +0530

    Test case to check updated_date (#3764)

commit 675cad2ed4
Author: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Date:   Fri Jun 21 18:29:39 2024 +0530

    Incorrect Integration Index Check (#3794)

* fix technique id

(cherry picked from commit a8ce53f82f)
2024-06-28 04:02:30 +00:00
Ruben Groenewoud 733c138b18 [New Rule & Tuning] Systemd Generator Created (#3801)
(cherry picked from commit cd4fe07c2c)
2024-06-27 20:03:51 +00:00
Ruben Groenewoud 4b88408acf [Rule Tuning] rc.local/rc.common File Creation (#3805)
(cherry picked from commit e941645b2f)
2024-06-27 19:53:55 +00:00
Ruben Groenewoud 2f292dacb4 [Rule Tuning] System V Init Script Created (#3811)
(cherry picked from commit 68bf4e453e)
2024-06-27 19:41:41 +00:00
Ruben Groenewoud efd192d5f6 [Rule Tuning] Executable Bit Set for Potential Persistence Script (#3812)
* [Rule Tuning] Executable Bit Set for Potential Persistence Script

* Update rules/linux/persistence_potential_persistence_script_executable_bit_set.toml

* Update persistence_potential_persistence_script_executable_bit_set.toml

---------

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

(cherry picked from commit 460b314f49)
2024-06-27 19:32:47 +00:00
Justin Ibarra 9193e4e9ff Trim codeowners (#3829)
(cherry picked from commit 74dd230e2d)
2024-06-27 18:40:15 +00:00
Jonhnathan 61be78d1f6 [Rule Tuning] LSASS Process Access via Windows API (#3839)
(cherry picked from commit 7693d785aa)
2024-06-27 15:25:21 +00:00
Ruben Groenewoud 2bf7df1890 [New Rule] Privilege Escalation via SUID/SGID (#3793)
* [New Rule] Privilege Escalation via SUID/SGID

* unit test error fix?

* Update rules/linux/privilege_escalation_potential_suid_sgid_exploitation.toml

(cherry picked from commit c3ba7b1262)
2024-06-27 14:53:31 +00:00
Ruben Groenewoud de7e0c7e38 [New Rule] User or Group Creation/Modification (#3804)
(cherry picked from commit 0ca16a1516)
2024-06-27 14:39:17 +00:00
Ruben Groenewoud 2c798a1d18 [Rule Tuning] SUID/SGID Bit Set (#3802)
(cherry picked from commit 8d063e1a47)
2024-06-27 14:31:05 +00:00
Samirbous 4daed66479 [New] Microsoft Management Console File from Unusual Path (#3834)
* [New] Windows Script Execution via MMC Console File

* Update execution_via_mmc_console_file_unusual_path.toml

* Update execution_via_mmc_console_file_unusual_path.toml

* Update rules/windows/execution_via_mmc_console_file_unusual_path.toml

* Update execution_via_mmc_console_file_unusual_path.toml

* Update execution_via_mmc_console_file_unusual_path.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

(cherry picked from commit 17a07020f3)
2024-06-27 10:35:57 +00:00
Jonhnathan 0e6ec1f961 [New Rule] AD Group Modification by SYSTEM (#3833)
* [New Rule] AD Group Modification by SYSTEM

* .

* Update rules/windows/persistence_group_modification_by_system.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Tighten up indexes

* Update persistence_group_modification_by_system.toml

* Apply suggestions from code review

Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>

(cherry picked from commit deb08fd28d)
2024-06-26 21:59:15 +00:00
Jonhnathan 8bab0df7bf [Rule Tuning] Add Initial Microsoft Defender for Endpoint Compatibility to Windows DRs (#3825)
* [Rule Tuning] Add Initial Microsoft Defender for Endpoint Compatibility to Windows DRs

* .

* Update integration-schemas.json.gz

* Fix integration manifests

Removed changes from:
- rules/windows/collection_email_powershell_exchange_mailbox.toml
- rules/windows/command_and_control_rdp_tunnel_plink.toml
- rules/windows/command_and_control_screenconnect_childproc.toml
- rules/windows/credential_access_domain_backup_dpapi_private_keys.toml
- rules/windows/credential_access_kirbi_file.toml
- rules/windows/defense_evasion_amsi_bypass_dllhijack.toml
- rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml
- rules/windows/defense_evasion_suspicious_zoom_child_process.toml
- rules/windows/execution_command_shell_started_by_unusual_process.toml
- rules/windows/initial_access_suspicious_ms_outlook_child_process.toml
- rules/windows/persistence_adobe_hijack_persistence.toml
- rules/windows/persistence_appcertdlls_registry.toml
- rules/windows/persistence_system_shells_via_services.toml

(selectively cherry picked from commit 54d5b442cf)
2024-06-26 14:09:43 +00:00
Ruben Groenewoud a8a6562872 [New Rules] Yum Plugin Creation / Discovery (#3820)
* [New Rules] Yum Plugin Creation / Discovery

* Update discovery_yum_plugin_detection.toml

* Update and rename discovery_yum_plugin_detection.toml to discovery_yum_dnf_plugin_detection.toml

(cherry picked from commit 6746a421c4)
2024-06-25 14:17:34 +00:00
Terrance DeJesus 45e6b901a2 [Hunt Tuning] Add Descriptions, Collapse Queries and Re-Generate Docs (#3791)
* add description to hunting schema; change queries to be a list

* update createremotethreat by process hunt

* update dll hijack and masquerading as MSFT library

* remove sysmon specific dDLL hijack via masquerading MSFT library

* updated Masquerading Attempts as Native Windows Binaries

* updates Rare DLL Side-Loading by Occurrence

* updates Rare LSASS Process Access Attempts

* update DNS Queries via LOLBins with Low Occurence Frequency

* updated Low Occurrence of Drivers Loaded on Unique Hosts

* updates Excessive RDP Network Activity by Host and User

* updates Excessive SMB Network Activity by Process ID

* updated Executable File Creation by an Unusual Microsoft Binary

* Frequency of Process Execution and Network Logon by Source Address

* updates Frequency of Process Execution and Network Logon by Source Address

* updated Execution via Remote Services by Client Address

* updated Startup Execution with Low Occurrence Frequency by Unique Host

* updated Low Frequency of Process Execution via WMI by Unique Agent

* updated Low Frequency of Process Execution via Windows Scheduled Task by Unique Agent

* updated Low Occurence of Process Execution via Windows Services with Unique Agent

* Updated High Count of Network Connection Over Extended Period by Process

* update Libraries Loaded by svchost with Low Occurrence Frequency

* updated Microsoft Office Child Processes with Low Occurrence Frequency by Unique Agent

* updated Network Discovery via Sensitive Ports by Unusual Process

* updated PE File Transfer via SMB_Admin Shares by Agent or User

* updated Persistence via Run Key with Low Occurrence Frequency

* updates Persistence via Startup with Low Occurrence Frequency by Unique Host

* updates "Persistence via Run Key with Low Occurrence Frequency"; adjusted file names to remove data source

* updates "Low Occurrence of Suspicious Launch Agent or Launch Daemon"

* updates "Egress Network Connections with Total Bytes Greater than Threshold"

* updates "Rundll32 Execution Aggregated by Command Line"

* updates "Scheduled tasks Creation by Action via Registry"

* updates "Scheduled Tasks Creation for Unique Hosts by Task Command"

* updates "Suspicious Base64 Encoded Powershell Command"

* updates "Suspicious DNS TXT Record Lookups by Process"

* updates "Unique Windows Services Creation by Service File Name"

* Updates "Unique Windows Services Creation by Service File Name"

* updates "Windows Command and Scripting Interpreter from Unusual Parent Process"

* updates "Windows Logon Activity by Source IP"

* updates "Suspicious Network Connections by Unsigned Mach-O"

* updates LLM hunting queries

* re-generated markdown files; updated generate markdown py file

* updated test_hunt_data

* Update hunting/macos/queries/suspicious_network_connections_by_unsigned_macho.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* Update hunting/windows/queries/drivers_load_with_low_occurrence_frequency.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* Update hunting/windows/queries/domain_names_queried_via_lolbins_and_with_low_occurence_frequency.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* updated missing integrations

* updated MD docs according to recent hunting changes

* Update hunting/windows/queries/executable_file_creation_by_an_unusual_microsoft_binary.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update hunting/windows/queries/detect_rare_dll_sideload_by_occurrence.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update hunting/windows/queries/detect_masquerading_attempts_as_native_windows_binaries.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update hunting/windows/queries/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update hunting/llm/queries/aws_bedrock_dos_resource_exhaustion_detection.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* added enrichment policy link to rule

* Update hunting/windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/rundll32_execution_aggregated_by_cmdline.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/index.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update hunting/windows/queries/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 632e169f7a)
2024-06-25 13:39:04 +00:00
github-actions[bot] 30f5784613 Lock versions for releases: 8.9,8.10,8.11,8.12,8.13,8.14 (#3821)
(cherry picked from commit 6f43d1f535)
2024-06-25 12:31:41 +00:00
James Valente a995f27c13 Tune rule to exclude forwarded events. (#3790)
Events containing "forwarded" as a tag may include host information
that is not related to the host running elastic agent. This triggers
false positive alerts. Examples include Entity Analytics integrations,
Palo Alto GlobalProtect activity, and M365 Defender device events.

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

(cherry picked from commit 0726ce41bf)
2024-06-25 11:25:08 +00:00
Mika Ayenson a1015c32e5 Revert "Test case to check updated_date (#3764)"
This reverts commit 73a50036b7.
2024-06-21 11:09:05 -05:00
shashank-elastic 73a50036b7 Test case to check updated_date (#3764)
(cherry picked from commit 7621a54fcc)
2024-06-21 13:16:55 +00:00
shashank-elastic c83a5a614b Incorrect Integration Index Check (#3794)
(cherry picked from commit 675cad2ed4)
2024-06-21 13:02:59 +00:00
Krishna Chaitanya Reddy Burri 24358ceb79 [Rule Tuning]: Fix threat_index and filters in Rapid7 CVE rule (#3800)
* Fix index and filters in Rapid7 CVE rule

* change updated date

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

(cherry picked from commit e9d7ddfa35)
2024-06-20 19:20:05 +00:00
Jonhnathan 0ab0ea4d10 [New Rule] Potential Privilege Escalation via Service ImagePath Modification (#3757)
* [New Rule] Potential Privilege Escalation via Service ImagePath Modification

* Update privilege_escalation_reg_service_imagepath_mod.toml

* [New Rule] NTDS Dump via Wbadmin

* Revert "[New Rule] NTDS Dump via Wbadmin"

This reverts commit 09fd513b1e8b35e22c7d1a371b0aa5aa4837cdc5.

* Apply suggestions from code review

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update privilege_escalation_reg_service_imagepath_mod.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit c20318d0d0)
2024-06-20 13:45:08 +00:00
Jonhnathan 0e6ebd6e7a [New Rule] NTDS Dump via Wbadmin (#3758)
* [New Rule] NTDS Dump via Wbadmin

* Update rules/windows/credential_access_wbadmin_ntds.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 236444200b)
2024-06-20 12:58:34 +00:00
Jonhnathan b8c63b0999 [New Rule] Potential WPAD Spoofing via DNS Record Creation (#3748)
(cherry picked from commit 3fd9bae611)
2024-06-20 12:38:06 +00:00
Jonhnathan b0c0fa4e35 Create defense_evasion_reg_disable_enableglobalqueryblocklist.toml (#3734)
(cherry picked from commit 6a0ac563a0)
2024-06-20 12:26:17 +00:00
Kirti Sodhi cbc7fb5224 Adding setup templates to the ML rules (#3798)
* Added setup instructions for ml rules

(cherry picked from commit 51b9717ac0)
2024-06-19 14:08:24 +00:00
Mika Ayenson 495539b697 [FR] Loosen Filters Schema Validation (#3753)
(cherry picked from commit 259efaf716)
2024-06-18 21:00:33 +00:00
Anthony 96c7509c20 Closes #2216 (#2855)
* Update privilege_escalation_sts_assumerole_usage.toml

* Update privilege_escalation_sts_assumerole_usage.toml

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

(cherry picked from commit c1dcd21531)
2024-06-13 20:56:04 +00:00
Terrance DeJesus 37ea64baf4 [New Rule] Rapid7 Threat Command CVEs Correlation (#3718)
* new rule 'Rapid7 Threat Command CVEs Correlation'

* Update rules/threat_intel/threat_intel_rapid7_threat_command.toml

Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>

* updated threat index and tags

* changed 'indicator match' to 'threat match' for tags

* removed timeline

* updating integrations to match main

* re-adding rapid7 threat command integration manifest and schema

* reverting changes; removing timeline

* changed max signals to 10000

---------

Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>

(cherry picked from commit 020ca4be24)
2024-06-12 22:04:56 +00:00
Jonhnathan c4a427178b [New Rule] Potential DNS Server Privilege Escalation via ServerLevelPluginDll (#3717)
* [New Rule] Potential DNS Server Privilege Escalation via ServerLevelPluginDll

* Update privilege_escalation_dns_serverlevelplugindll.toml

* Update privilege_escalation_dns_serverlevelplugindll.toml

* Update rules/windows/privilege_escalation_dns_serverlevelplugindll.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 4eff7c6c87)
2024-06-12 18:21:54 +00:00
Justin Ibarra cacdd7e717 [New hunts] 50 ES|QL Windows Hunt Queries (#3642)
* [New Hunt] Initial add of Windows hunt queries

* Add markdown files

* Added license to schema and md generation

* add hunt index; minor tweaks to script

* minor tweaks from feedback

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update hunting/macos/queries/suspicious_network_connections_by_unsigned_macho.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* convert integrations to list

* Update script to generate integration links

* validate generated integrations links

* Update hunting/windows/docs/execution_via_remote_services_by_client_address.md

* Update hunting/windows/queries/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.toml

* Update hunting/windows/queries/execution_via_remote_services_by_client_address.toml

* Update hunting/windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md

* Update hunting/windows/queries/execution_via_network_logon_by_occurrence_frequency.toml

* Update hunting/windows/docs/execution_via_network_logon_by_occurrence_frequency.md

* update docs with naming information

* Create suspicious_base64_encoded_powershell_commands.toml

* Create scheduled_task_creation_by_action_via_registry.toml

* Create suspicious_base64_encoded_powershell_commands.md

* Create scheduled_task_creation_by_action_via_registry.md

* Update index.md

---------

Co-authored-by: brokensound77 <brokensound77@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 48e85439e0)
2024-06-12 16:12:25 +00:00
shashank-elastic bc578b5464 Update FIM integration Setup sequence (#3781)
(cherry picked from commit 89d89f15d2)
2024-06-12 11:14:29 +00:00
github-actions[bot] 24d79f230e Lock versions for releases: 8.9,8.10,8.11,8.12,8.13,8.14 (#3778)
(cherry picked from commit e3a72c6c47)
2024-06-11 15:30:13 +00:00
James Valente d8131f9c60 Add exceptions to C2 Beaconing Activity (#3771)
(cherry picked from commit 8baf5dc2d8)
2024-06-11 13:17:09 +00:00
Ruben Groenewoud d26951d94e [New Rule] Suspicious File Modification (#3746)
* [New Rule] Suspicious File Modification

* Update persistence_suspicious_file_modifications.toml

* Update rules/linux/persistence_suspicious_file_modifications.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/linux/persistence_suspicious_file_modifications.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Updates

* Update rules/integrations/fim/persistence_suspicious_file_modifications.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>

(cherry picked from commit ec223a4a05)
2024-06-11 11:06:39 +00:00
Ruben Groenewoud 14de5313e8 [New Rules] PAM Module Creation & Unusual PAM Grantor (#3743)
* [New Rules] PAM Module Creation & Unusual PAM Grantor

* Update persistence_unusual_pam_grantor.toml

* Update persistence_pluggable_authentication_module_creation.toml

* Update rules/linux/persistence_pluggable_authentication_module_creation.toml

* Update persistence_pluggable_authentication_module_creation.toml

* Update persistence_unusual_pam_grantor.toml

* Update rules/linux/persistence_pluggable_authentication_module_creation.toml

(cherry picked from commit c87c4c9f5d)
2024-06-11 09:54:34 +00:00
Ruben Groenewoud b6d29a6775 [Rule Tuning] Systemd-udevd Rule File Creation (#3738)
* [Rule Tuning] Systemd-udevd Rule File Creation

* Incompatible endgame field

* Update rules/linux/persistence_udev_rule_creation.toml

* Update rules/linux/persistence_udev_rule_creation.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules/linux/persistence_udev_rule_creation.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update persistence_udev_rule_creation.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 4cf0c2b9af)
2024-06-11 09:43:57 +00:00
Ruben Groenewoud 1e16e806c7 [New Rule] APT Package Manager Configuration File Creation (#3739)
* [New Rule] APT Package Manager Configuration File Creation

* Update rules/linux/persistence_apt_package_manager_file_creation.toml

* Update persistence_apt_package_manager_file_creation.toml

(cherry picked from commit 4003219aa1)
2024-06-11 07:46:33 +00:00
Terrance DeJesus cee60a88af fixed index (#3770)
(cherry picked from commit 13140d532c)
2024-06-10 13:38:34 +00:00
Ruben Groenewoud 6fadd533fe [New Rule] Network Connection Initiated by SSH Parent Process (#3759)
* [New Rule] Network Connection Initiated by SSH Parent Process

* Update persistence_ssh_netcon.toml

* Update rules/linux/persistence_ssh_netcon.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules/linux/persistence_ssh_netcon.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update persistence_ssh_netcon.toml

* Update persistence_ssh_netcon.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 74f049cc7c)
2024-06-10 08:33:52 +00:00
Ruben Groenewoud 9f5c795ea5 [New Rule] Netcon through XDG Autostart Entry (#3741)
* [New Rule] Netcon through XDG Autostart Entry

* Update rules/linux/persistence_xdg_autostart_netcon.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update persistence_xdg_autostart_netcon.toml

* Update persistence_xdg_autostart_netcon.toml

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

(cherry picked from commit 29bb52d2fb)
2024-06-10 08:20:29 +00:00
Ruben Groenewoud 7ba1a863b5 [New Rule] Executable Bit Set for rc.local/rc.common (#3736)
* [New Rule] Executable Bit Set for rc.local/rc.common

* Endgame compatibility

* Update rules/linux/persistence_rc_local_common_executable_bit_set.toml

(cherry picked from commit 70496f813f)
2024-06-10 08:00:14 +00:00
Jonhnathan fff49e7f09 [Rule Tuning] User Added to Privileged Group (#3763)
* [New Rule] User Added to Privileged Group

* add more groups

* Update rules/windows/persistence_user_account_added_to_privileged_group_ad.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update persistence_user_account_added_to_privileged_group_ad.toml

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

(cherry picked from commit 087e8a6e85)
2024-06-07 16:46:52 +00:00
shashank-elastic dbfdb7f804 Test deprecated rule modification (#3727)
(cherry picked from commit f9b3534cdd)
2024-06-07 13:57:45 +00:00
Eric Forte 4077572a3b react_sync_rta_updates_3575 (#3762)
(cherry picked from commit 57095a28b9)
2024-06-06 18:45:36 +00:00
Ruben Groenewoud 886ce70678 [New Rule] Process Capability Set via setcap Utility (#3744)
* [New Rule] Process Capability Set via setcap Utility

* ++

* Update rules/linux/persistence_process_capability_set_via_setcap.toml

(cherry picked from commit d3e2f70ce2)
2024-06-06 10:47:40 +00:00
Ruben Groenewoud 71394edb86 [Rule Tuning] System Binary Moved or Copied (#3742)
* [Rule Tuning] System Binary Moved or Copied

* Added reference

* Update defense_evasion_binary_copied_to_suspicious_directory.toml

* Update defense_evasion_binary_copied_to_suspicious_directory.toml

(cherry picked from commit 8e6114f76c)
2024-06-06 10:27:50 +00:00