Jonhnathan
|
7b9cd77bc2
|
[New Rule] Potential PowerShell Obfuscation via Character Array Reconstruction (#4608)
|
2025-05-06 18:18:29 +05:30 |
|
Jonhnathan
|
ebe77f2d86
|
[New Rule] Potential PowerShell Obfuscation via String Concatenation (#4607)
|
2025-05-06 18:02:35 +05:30 |
|
Ruben Groenewoud
|
fdc6b09d54
|
[New Rule] System Binary Symlink to Suspicious Location (#4682)
|
2025-05-06 17:46:47 +05:30 |
|
Ruben Groenewoud
|
25dc8498ae
|
[New Rule] Suspicious Named Pipe Creation (#4681)
|
2025-05-06 17:30:38 +05:30 |
|
Ruben Groenewoud
|
8b08795e00
|
[New Rule] Suspicious Kernel Feature Activity (#4676)
|
2025-05-06 17:13:24 +05:30 |
|
Ruben Groenewoud
|
0193af2842
|
[New Rule] Potential Data Exfiltration Through Curl (#4678)
|
2025-05-06 16:57:59 +05:30 |
|
Ruben Groenewoud
|
4030de9295
|
[New/Tuning] Potential Hex Payload Execution via Command-Line (#4675)
|
2025-05-06 16:29:03 +05:30 |
|
Ruben Groenewoud
|
eb3520a63b
|
[New Rule] Potential Backdoor Execution Through PAM_EXEC (#4674)
|
2025-05-06 16:13:23 +05:30 |
|
Samirbous
|
91acb4e9ce
|
[New] Windows Sandbox with Sensitive Configuration (#4606)
https://blog-en.itochuci.co.jp/entry/2025/03/12/140000
|
2025-05-06 15:58:39 +05:30 |
|
Samirbous
|
04f15aa08c
|
[New] Rare Connection to WebDAV Target (#4667)
|
2025-05-06 15:41:30 +05:30 |
|
Samirbous
|
70f758d9ad
|
[New] Microsoft Azure or Mail Sign-in from a Suspicious Source (#4673)
|
2025-05-06 15:21:11 +05:30 |
|
Ruben Groenewoud
|
403e20c2c6
|
[New Rule] Git Repository or File Download to Suspicious Directory (#4663)
|
2025-05-06 15:05:27 +05:30 |
|
Ruben Groenewoud
|
3f9e2edcb5
|
[New Rule] Manual Mount Discovery via /etc/exports (#4662)
|
2025-05-06 14:48:55 +05:30 |
|
Ruben Groenewoud
|
a9e8a78c09
|
[New Rule] Docker Release File Creation (#4661)
|
2025-05-06 14:31:52 +05:30 |
|
Ruben Groenewoud
|
13cf424ef5
|
[New Rule] Manual Memory Dumping via Proc Filesystem (#4660)
|
2025-05-06 14:16:15 +05:30 |
|
Ruben Groenewoud
|
c9c41747fc
|
[FN Tuning] Suspicious /proc/maps Discovery (#4659)
|
2025-05-06 13:59:44 +05:30 |
|
Ruben Groenewoud
|
1150271372
|
[New Rule] Suspicious Path Mounted (#4664)
|
2025-05-06 13:43:00 +05:30 |
|
Samirbous
|
bcff3f95d5
|
Update command_and_control_common_webservices.toml (#4686)
|
2025-05-06 13:27:21 +05:30 |
|
Samirbous
|
f480e98f16
|
[New] Concurrent Azure SignIns with Suspicious Properties (#4670)
|
2025-05-06 13:09:54 +05:30 |
|
Samirbous
|
6e3b38c645
|
[New] Suspicious Microsoft 365 UserLoggedIn via OAuth Code (#4691)
|
2025-05-06 12:53:33 +05:30 |
|
Terrance DeJesus
|
57be590d73
|
[New Rule] Adding Coverage for Suspicious Activity via Auth Broker On-Behalf-of Principal User (#4687)
|
2025-05-06 12:41:57 +05:30 |
|
Terrance DeJesus
|
58d03d4043
|
[New Rule] Adding Coverage for Microsoft Entra ID SharePoint Access for User Principal via Auth Broker (#4695)
* new rule 'Microsoft Entra ID SharePoint Access for User Principal via Auth Broker'
* updated severity
* added new terms note
|
2025-05-05 16:45:47 -04:00 |
|
shashank-elastic
|
e4856d3c2c
|
Refresh ecs, beats, integration manifests & schemas (#4699)
|
2025-05-05 23:06:40 +05:30 |
|
Ruben Groenewoud
|
18e1103c51
|
[New Rule] Potential Linux Tunneling and/or Port Forwarding via SSH Option (#4658)
|
2025-05-05 09:59:08 +02:00 |
|
shashank-elastic
|
b3adc6d3ea
|
Deprecate Experimental ML command (#4669)
|
2025-05-02 21:01:46 +05:30 |
|
Samirbous
|
dddc2a7bb9
|
[New] Microsoft 365 OAuth Redirect to Device Registration for User (#4694)
* [New] Microsoft 365 OAuth Redirect to Device Registration for User Principal
https://github.com/elastic/ia-trade-team/issues/590
* Update non-ecs-schema.json
* Update pyproject.toml
* Update credential_access_antra_id_device_reg_via_oauth_redirection.toml
* Update credential_access_antra_id_device_reg_via_oauth_redirection.toml
* Update credential_access_antra_id_device_reg_via_oauth_redirection.toml
* fixed investigation guide formatting; fixed unit test failure
* updated patch version
---------
Co-authored-by: terrancedejesus <terrance.dejesus@elastic.co>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
|
2025-05-02 08:36:10 +01:00 |
|
Terrance DeJesus
|
ce66f52aad
|
[New Rule] Adding Coverage for Microsoft Entra ID Protection Anonymized IP Risk Detection (#4689)
* Adding new rule 'Microsoft Entra ID Protection Anonymized IP Risk Detection'
* updating description
* adding index
* updating mitre tactic mapping
* updating file name
|
2025-05-01 23:03:50 -04:00 |
|
Terrance DeJesus
|
bae7835f6a
|
[New Rule] MSFT Tenant OAuth Phishing via First-Party VSCode Client (#4642)
* new rules for MSFT Oauth phishing in Azure, Entra and Microsoft 365
* changed m365 file name
* fixed duplicate tactics
* updaing non-ecs for graph activity logs
* updating rules; investigation guides; formatting, linting errors
|
2025-05-01 22:38:41 -04:00 |
|
Terrance DeJesus
|
ff2ecad573
|
[New Rule] Adding Coverage for AWS S3 Static Site JavaScript File Uploaded (#4617)
* new rule 'AWS S3 Static Site JavaScript File Uploaded'
* adjusting name
* updated keep command
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
|
2025-04-30 16:25:03 -04:00 |
|
Sergey Polzunov
|
ba959f2ceb
|
fix: Fixing leftover references to sha256 method (#4690)
* Fixing missed old method name usage
* Patch version bump
|
2025-04-30 20:34:15 +02:00 |
|
github-actions[bot]
|
fc1e6145cc
|
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4679)
|
2025-04-30 18:11:35 +05:30 |
|
Sergey Polzunov
|
d72cb92d59
|
Bringing back "fix: Cleaning up the hashable content for the rule" (#4621) (#4668)
|
2025-04-28 21:59:55 +05:30 |
|
shashank-elastic
|
97e6d8b706
|
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4665)
|
2025-04-25 20:35:09 +05:30 |
|
Terrance DeJesus
|
f02ccfef64
|
[New Rule] Adding Coverage for AWS IAM or STS API Calls via Temporary Session Tokens (#4628)
* adding new rule 'AWS IAM or STS API Calls via Temporary Session Tokens'
* updated name and query logic
* updated query logic
* changed rule to new terms
* fixed logic
* Update rules/integrations/aws/persistence_iam_sts_api_calls_via_user_session_token.toml
* Update rules/integrations/aws/persistence_iam_sts_api_calls_via_user_session_token.toml
* updated investigation guide; scoped to IAM only; updated naming
* updating file name
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
|
2025-04-24 15:39:51 -04:00 |
|
Sergey Polzunov
|
191396e5e8
|
Version bump (#4655)
|
2025-04-24 13:19:36 -04:00 |
|
Sergey Polzunov
|
b7a324b2e8
|
Revert "fix: Cleaning up the hashable content for the rule (#4621)" (#4654)
This reverts commit 80c4f7eacc.
|
2025-04-24 19:05:17 +02:00 |
|
Colson Wilhoit
|
84966f02a1
|
[Tuning] Update DPRK ByBit Hunting Queries (#4645)
* fix
* markdown generate
* adding missing streamlit hunting query
---------
Co-authored-by: terrancedejesus <terrance.dejesus@elastic.co>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
|
2025-04-24 07:58:06 -05:00 |
|
Sergey Polzunov
|
80c4f7eacc
|
fix: Cleaning up the hashable content for the rule (#4621)
|
2025-04-24 14:33:26 +05:30 |
|
Isai
|
b429be2bda
|
[Rule Tuning] O365 Exchange Suspicious Mailbox Right Delegation (#4648)
|
2025-04-24 10:19:06 +05:30 |
|
github-actions[bot]
|
70062c3991
|
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4649)
|
2025-04-24 07:12:12 +05:30 |
|
shashank-elastic
|
34231160ee
|
Fix versions for changes in required_fileds (#4640)
|
2025-04-24 06:28:18 +05:30 |
|
Jonhnathan
|
b9ed05562d
|
[Rule Tuning] User Added to Privileged Group in Active Directory (#4646)
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
|
2025-04-24 06:12:33 +05:30 |
|
Jonhnathan
|
e8e76972f5
|
[Rule Tuning] Replace legacy winlog.api usage (#4647)
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
|
2025-04-24 05:52:38 +05:30 |
|
shashank-elastic
|
54fadc8e2e
|
Add 8.18 and 9.0 beats schemas (#4641)
|
2025-04-24 05:36:45 +05:30 |
|
Terrance DeJesus
|
bbfc026c95
|
[New Hunt] New Hunting Queries for DPRK ByBit (#4644)
* new hunting queries for macOS DPRK
* added docker hunting queries
|
2025-04-23 16:41:23 -04:00 |
|
Samirbous
|
ea31143b83
|
[New] Suspicious Azure Sign-in via Visual Studio Code (#4639)
* Create initial_access_entra_login_visual_code_phish.toml
* Update non-ecs-schema.json
* Update initial_access_entra_susp_visual_code_signin.toml
* Update pyproject.toml
* Update initial_access_entra_susp_visual_code_signin.toml
* Update non-ecs-schema.json
|
2025-04-23 14:06:05 +01:00 |
|
Samirbous
|
f8e91be329
|
[New] RemoteMonologue Attack rules (#4604)
* [New] RemoteMonologue Attack rules
https://www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions#1
https://github.com/xforcered/RemoteMonologue
* Update rules/windows/defense_evasion_ntlm_downgrade.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
* Update defense_evasion_ntlm_downgrade.toml
* Update rules/windows/defense_evasion_ntlm_downgrade.toml
* Update rules/windows/defense_evasion_ntlm_downgrade.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
|
2025-04-22 15:26:57 -03:00 |
|
Jonhnathan
|
1bab74179e
|
[New Rule] Potential Malicious PowerShell Based on Alert Correlation (#4635)
* [New Rule] Potential Malicious PowerShell Based on Alert Correlation
* Update execution_posh_malicious_script_agg.toml
|
2025-04-22 13:36:04 -03:00 |
|
Colson Wilhoit
|
c80319d462
|
[Deprecate] LaunchDaemon Creation or Modification and Immediate Loading (#4547)
|
2025-04-22 21:23:01 +05:30 |
|
Jonhnathan
|
8361cfd205
|
[New Rule] Potential PowerShell Obfuscation via String Reordering (#4595)
* [New Rule] Potential PowerShell Obfuscation via String Reordering
* Update defense_evasion_posh_obfuscation_string_format.toml
* Update rules/windows/defense_evasion_posh_obfuscation_string_format.toml
* Update defense_evasion_posh_obfuscation_string_format.toml
* Update rules/windows/defense_evasion_posh_obfuscation_string_format.toml
* Update rules/windows/defense_evasion_posh_obfuscation_string_format.toml
|
2025-04-22 12:26:55 -03:00 |
|