Commit Graph

2412 Commits

Author SHA1 Message Date
Ruben Groenewoud 6bc808916b [New Rule] Kubeconfig File Discovery (#4811)
* [New Rule] Kubeconfig File Discovery

* Update discovery_kubeconfig_file_discovery.toml
2025-06-17 14:42:39 +02:00
Ruben Groenewoud 103fbf12c8 [Rule Tuning] Container Management Utility Run Inside A Container (#4809)
* [Rule Tuning] Container Management Utility Run Inside A Container

* ++
2025-06-17 14:30:34 +02:00
Ruben Groenewoud dfd46a09e8 [New Rule] Kubectl Permission Discovery (#4812) 2025-06-17 14:14:35 +02:00
Ruben Groenewoud ac57818efb [Rule Tuning] Kubernetes User Exec into Pod (#4814) 2025-06-17 14:02:29 +02:00
Samirbous 5273729106 [New] Potential Machine Account Relay Attack via SMB (#4803)
* [New] Potential Machine Account Relay Attack via SMB

Identify a server machine account accessing itself via SMB but from a remote source.ip, this behavior is abnormal and match SMB relay:

* Update credential_access_machine_account_smb_relay.toml

* Update credential_access_machine_account_smb_relay.toml

* Update credential_access_machine_account_smb_relay.toml

* Update rules/windows/credential_access_machine_account_smb_relay.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update credential_access_machine_account_smb_relay.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-06-16 17:16:04 +01:00
Jonhnathan d8d898d12d [Rule Tuning] Outlook Home Page Registry Modification (#4798) 2025-06-16 08:01:45 -03:00
Samirbous 718b64f1df Update execution_downloaded_url_file.toml (#4794) 2025-06-12 12:11:19 +01:00
Samirbous ba55fb412b [New] Potential CVE-2025-33053 Exploitation (#4795)
* Create initial_access_url_cve_2025_33053.toml

* Delete docs/docset.yml

* Revert "Delete docs/docset.yml"

This reverts commit 5d0e6a68eb5510b6f3d9325cfcdf156bf11e1992.

* Update initial_access_url_cve_2025_33053.toml
2025-06-12 08:08:20 +01:00
Terrance DeJesus c7c1586160 [Rule Deprecation] Azure Entra Sign-in Brute Force Microsoft 365 Accounts by Repeat Source (#4780)
* rule deprecation

* adjusted investigation guide
2025-06-10 12:02:54 -04:00
Terrance DeJesus 9569aa4860 [New Rule] Microsoft Entra ID Excessive Account Lockouts Detected (#4782)
* new rule Microsoft Entra ID Exccessive Account Lockouts Detected

* updating investigation guide

* removed user agent exception

* linted
2025-06-10 11:31:35 -04:00
Samirbous c8d6e32d1c Update privilege_escalation_unusual_parentchild_relationship.toml (#4775)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-06-09 18:58:55 +01:00
Isai 11468edab6 [Rule Tuning] AWS EC2 Unauthorized Admin Credential Fetch via Assumed Role (#4774)
* [Rule Tuning] AWS EC2 Unauthorized Admin Credential Fetch via Assumed Role

- Edited Rule Name, Description, and Investigation Guide to better align with the behavior captured by this rule
- adjusted execution window
- added highlighted fields

* adding account id to highlighted fields

adding account id to highlighted fields

* changing AWS EC2 tag for consistency across EC2 rules

changing AWS EC2 tag for consistency across EC2 rules
2025-06-06 15:08:48 -04:00
Isai a9fe1b107a [Rule Tunings] AWS EC2 Flow Log Deletion and Network ACL Activity (#4778)
"AWS VPC Flow Logs Deletion"
Rule Triggers as expected
Telemetry looks fine
- changed time window
- added AWS EC2 tag
- Added highlighted fields
- updated Mitre technique

"AWS EC2 Network Access Control List Deletion"
Rule Triggers as expected
Telemetry looks fine
- changed time window
- added AWS EC2 tag
- Added highlighted fields
- updated Mitre technique

"AWS EC2 Network Access Control List Creation"
Rule Triggers as expected
Telemetry looks fine
- changed time window
- Added highlighted fields
- added Defense Evasion Mitre technique and tag
2025-06-06 14:11:54 -04:00
Ruben Groenewoud b2887e592b [Rule Tuning] Loadable Kernel Module Configuration File Creation (#4765) 2025-06-05 13:12:24 +02:00
Isai 6538fb1662 [Rule Tuning][New Rule][Deprecation] AWS EC2 EBS Snapshot Activity Rules (#4763)
* [Rule Tuning][New Rule][Deprecation] AWS EC2 EBS Snapshot Activity Rules

1. Rule Tuning - to prevent duplicate alerts for AWS EC2 EBS Snapshot Shared of Made Public, the execution interval has been adjusted from 5m interval with 4m lookback to 5m interval with 1m lookback.
2. New Rule - to capture when access is removed from an EBS Snapshot. While this may be intentional behavior it could indicate malicious attempts to inhibit system recovery efforts post-compromise, or to maintain exclusive access to critical backups by removing permissions for all users except their own controlled account.
3. Deprecate - AWS EC2 Snapshot Activity is too broad a rule and the behavior of the other 2 rules resulting in duplicate alerts and non-specific context for which permission change type is happening (`add` vs `remove`).

* adding updated_date to new rule

* adding Deprecated to IG title

* adding source.address to keep fields
2025-06-04 10:49:52 -04:00
Terrance DeJesus 0a8c3ca471 new rule for bloodhound user agents (#4769) 2025-06-04 09:11:13 -04:00
Terrance DeJesus 71c82ec475 [New Rule] Entra ID Protection - Risk Detection - User Risk (#4762)
* new rule Entra ID Protection - Risk Detection - User Risk

* adding max signals note

* adjusted mitre mapping

* Update rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
2025-06-04 08:59:01 -04:00
Terrance DeJesus 61fb056f05 [Rule Tuning] Microsoft Entra ID Protection Anonymized IP Risk Detection (#4759)
* tuning Microsoft Entra ID Protection Anonymized IP Risk Detection

* adjusted tags and mappings

* added max signals

* adjusted file name

* adding max signals note

* adjusted mitre mapping
2025-06-04 08:31:21 -04:00
Ruben Groenewoud ba9f76c6b5 [Rule Tuning] Shell Configuration Creation or Modification (#4766) 2025-06-04 11:26:45 +02:00
Isai c9a1ba358e [Tuning] AWS Access Token Used from Multiple Addresses (#4753)
* [Tuning] AWS Access Token Used from Multiple Addresses

Rule tuning for AWS STS Temporary IAM Session Token Used from Multiple Addresses

* update min stack

* add access key identification to IG

add access key identification to IG

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-06-02 11:32:05 -04:00
Terrance DeJesus aef166c301 [New Rule] Microsoft 365 Suspicious Inbox Rule to Delete or Move Emails (#4743)
* new rule Microsoft 365 Suspicious Inbox Rule to Delete or Move Emails

* updating uuid

* adjusted query logic per KQL parser

* adjusted metadata for integration
2025-06-02 10:02:18 -04:00
Samirbous 0abd8c923a Create defense_evasion_lsass_ppl_disabled_registry.toml (#4747) 2025-05-29 10:55:14 +01:00
Terrance DeJesus bfca0ea414 [New Hunt] Commvault Supply Chain Threat (#4748)
* hunts for CommVault threat

* added lookback time to ESQL query

* updated query logic
2025-05-28 14:11:46 -04:00
Terrance DeJesus 17d98cc8dd [Rule Tuning] Tuning Azure Entra Sign-in Brute Force against Microsoft 365 Accounts (#4737)
* rule tuning 'Potential Microsoft 365 Brute Force via Entra ID Sign-Ins'

* updated lookback windows, date truncation times

* updated investigation guide
2025-05-28 13:45:15 -04:00
Terrance DeJesus 4bd8469c38 [New Rule] Microsoft Entra ID Elevated Access to User Access Administrator (#4742)
* new rule Microsoft Entra ID Elevated Access to User Access Administrator

* updating uuid
2025-05-28 13:33:22 -04:00
Terrance DeJesus 22d780f9af [New Rule] Microsoft Entra ID User Reported Suspicious Activity (#4740)
* new rule Microsoft Entra ID User Reported Suspicious Activity

* Update rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-05-28 11:55:51 -04:00
Terrance DeJesus 0d4db2ecfe tuning 'Microsoft Entra ID High Risk Sign-in' (#4739) 2025-05-28 11:40:04 -04:00
Samirbous bb63887741 [New] BadSuccessor dMSA Abuse Detections (#4745)
* [New] BadSuccessor dMSA Abuse Detections

https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory

using new term rule type with events 5136/5137 by winlog.event_data.SubjectUserName to detect unusual accounts performing dMSA changes (creation of a new dMSA account or the modification of the `msDS-ManagedAccountPrecededByLink` attribute to take over a target account)

* Update privilege_escalation_dmsa_creation_by_unusual_user.toml
2025-05-25 09:38:15 +01:00
Terrance DeJesus fab0933df4 [Rule Tuning] Tuning Microsoft 365 Global Administrator Role Assigned (#4738)
* tuning 'Microsoft 365 Global Administrator Role Assigned'

* Update rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-05-21 12:47:58 -04:00
Samirbous 2c2b3e7d12 [Tuning] Lateral Movement Rules (#4736)
* Update lateral_movement_incoming_winrm_shell_execution.toml

* Update execution_suspicious_cmd_wmi.toml

* Update lateral_movement_incoming_wmi.toml

* Update lateral_movement_powershell_remoting_target.toml

* Update lateral_movement_incoming_wmi.toml

* Update execution_suspicious_cmd_wmi.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-05-21 15:59:45 +01:00
Samirbous 22cf1f0ced [Tuning] Account Discovery Command via SYSTEM Account (#4734)
* Update discovery_command_system_account.toml

* Update discovery_command_system_account.toml

* Update discovery_command_system_account.toml

* Update discovery_command_system_account.toml

* Update discovery_command_system_account.toml
2025-05-21 06:25:16 +01:00
Terrance DeJesus 82bee3e9c2 [Rule Tuning] Microsoft Graph First Occurrence of Client Request (#4728)
* tuning 'Microsoft Graph First Occurrence of Client Request'

* updated update date
2025-05-19 14:56:21 -04:00
Terrance DeJesus fcd70b284b [New Rule] Multiple Microsoft 365 User Account Lockouts in Short Time Window (#4717)
* new rule 'Multiple Microsoft 365 User Account Lockouts in Short Time Window'

* adjusted logic

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-19 14:44:46 -04:00
Terrance DeJesus 3e0a9ec47b [Rule Tuning] Potential Microsoft 365 User Account Brute Force (#4716)
* tuning M365 brute force rule

* updated logic

* updated references

* adds minstack for values

* removed ignoring MSFT ASN

* Update rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-19 14:08:38 -04:00
Jonhnathan e6fb73970d [Rule Tuning] Startup or Run Key Registry Modification (#4710) 2025-05-19 22:12:37 +05:30
Jonhnathan 9af2bf4a66 [Rule Tuning] Unusual Scheduled Task Update (#4714) 2025-05-19 21:51:14 +05:30
Samirbous f2f9cdac66 Update initial_access_azure_o365_with_network_alert.toml (#4723)
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-05-19 20:54:19 +05:30
Jonhnathan 47059e22f2 [Rule Tuning] Backup Deletion with Wbadmin (#4715) 2025-05-19 20:34:25 +05:30
Terrance DeJesus 8f27c24528 [New Rule] Suspicious Email Access by First-Party Application via Microsoft Graph (#4704)
* new rule 'Suspicious Email Access by First-Party Application via Microsoft Graph'

* updated patch version

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-09 20:49:08 -04:00
Terrance DeJesus d83e1c711a [New Rule] Microsoft Entra Session Reuse with Suspicious Graph Access (#4711)
* new rule 'Microsoft Entra Session Reuse with Suspicious Graph Access'

* fixed tags; linted

* fixed mitre mappings

* updated name and investigation guide
2025-05-09 20:32:22 -04:00
Jonhnathan d30e65e5a2 [Rule Tuning] Unusual File Creation - Alternate Data Stream (#4712) 2025-05-09 13:56:54 -03:00
Terrance DeJesus 762857f15f [Rule Tuning] Tuning Suspicious Mailbox Permission Delegation in Exchange Online (#4705)
* rule tuning 'Suspicious Mailbox Permission Delegation in Exchange Online'

* Update rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml

* updated date
2025-05-08 11:01:00 -04:00
shashank-elastic 0f3bfcd98a Fix new term doc broken link (#4706) 2025-05-07 17:03:58 +05:30
James Valente 36d595ae2f [Rule Tuning] Add exceptions for non-interactive signin failures for Entra M365 Bruteforce (#4405)
* Add exceptions for non-interactive signin failures.

Include exceptions for error codes, restricted to `NonInteractiveUserSignInLogs` and token refreshes:

- 70043 : Refresh token expired or no longer valid due to conditional access frequency checks
- 70044 : Session expired or no longer valid due to conditional access frequency checks
- 50057 : User account is disabled

* Update rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml

* Update metadata for `updated_date`

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-05-06 22:43:15 +05:30
Ruben Groenewoud 3a601a10fb [New Rule] Unusual Exim4 Child Process (#4684) 2025-05-06 22:24:34 +05:30
Ruben Groenewoud c145e33f16 [New Rule] Unusual Execution from Kernel Thread (kthreadd) Parent (#4683) 2025-05-06 22:08:43 +05:30
Ruben Groenewoud 608e02e27e [New Rule] Linux Telegram API Request (#4677) 2025-05-06 21:53:19 +05:30
Jonhnathan d3aa4b2f38 [Rule Tuning] Reduce Severity from Critical to High (#4637) 2025-05-06 21:37:47 +05:30
Ruben Groenewoud 944428d81e [New Rule] Unusual LD_PRELOAD/LD_LIBRARY_PATH Command Line Arguments (#4685) 2025-05-06 21:21:58 +05:30
Jonhnathan e028bf7954 [New Rule] Potential Dynamic IEX Reconstruction via Environment Variables (#4633) 2025-05-06 21:06:06 +05:30