Commit Graph

2553 Commits

Author SHA1 Message Date
Terrance DeJesus 1d3dad243c [Rule Tuning] Entra ID OAuth Device Code Grant by Unusual User (#5791)
* [Rule Tuning] Entra ID OAuth Device Code Grant by Unusual User
Fixes #5790

* updated description and investigation guide
2026-03-10 10:37:38 -04:00
Terrance DeJesus 0ae390ce6f [New Rule] Entra ID Domain Federation Abuse (#5809) 2026-03-10 10:16:50 -04:00
Terrance DeJesus 386e69bfea [New Rule] M365 SharePoint Site Sharing Policy Weakened (#5795)
* [New Rule] M365 SharePoint Site Sharing Policy Weakened

* removed the comments

* adding original author
2026-03-10 09:48:59 -04:00
Samirbous 2d6172e9c2 Update command_and_control_dns_rmm_domains_non_browser.toml (#5819)
minor change to unblock release.
2026-03-10 12:07:39 +00:00
Isai 926befff83 [Rule Tuning] AWS Access Token Used from Multiple Addresses (#5785)
* [Rule Tuning] AWS Access Token Used from Multiple Addresses

Summary
Tuning changes to reduce noise and improve fidelity for the AWS Access Token Used from Multiple Addresses rule. After several tuning this rule is still producing ~2000 alerts/day

- Added aws.cloudtrail.session_credential_from_console exclusion to filter out legitimate console login sessions
- Added Esql.event_provider_count_distinct > 1 condition requiring activity across multiple AWS services to reduce single-service noise
- Changed interval from 5m to 30m to reduce alert frequency
- Updated query time window from 30 minutes to 32 minutes to align with the from setting
- Added min_stack_version = "9.2.0" for the new console credential field (AWS integration 4.6.0+)

Rational
- Console login sessions generate temporary credentials that can appear from multiple IPs during VPN/network transitions
- Requiring activity across multiple AWS service providers increases confidence that the token is being used for broader reconnaissance rather than normal single-service operations
- Longer interval reduces duplicate alerting per access token while still catching the behavior within the 32-minute aggregation window

* Apply suggestions from code review

* Update rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml

* Update initial_access_iam_session_token_used_from_multiple_addresses.toml
2026-03-09 13:57:57 -04:00
Samirbous afcb342c55 [Tuning/New] RMM Rules (#5810)
* [Tuning/New] RMM Rules

- replaced RAT by RMM (RMM != RAT)
- added extra RMM processes, added process.parent.name and parent code signature too (GoToHTTP, tacticalrmm and more).
- added more references
- new term rule based on dns.question.name

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* ++

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* Update rules/windows/command_and_control_new_terms_commonly_abused_rat_execution.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* ++

* ++

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update rules/windows/command_and_control_dns_rmm_domains_non_browser.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

* Update command_and_control_dns_rmm_domains_non_browser.toml

* Update command_and_control_new_terms_commonly_abused_rat_execution.toml

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-03-09 16:33:47 +00:00
Samirbous ec4a0e58e4 [New] Suspicious Execution from VS Code Extension (#5786)
* [New] Suspicious Execution from VS Code Extension

Detects suspicious process execution launched from a VS Code extension context (parent command line contains
.vscode/extensions). Malicious extensions can run on startup and drop or execute payloads (e.g. RATs like
ScreenConnect, script interpreters, or download utilities). This covers both script/LOLBin children and
recently created executables from non-Program Files paths, as seen in campaigns such as the fake Clawdbot
extension that installed ScreenConnect RAT.

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* ++

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* Update initial_access_suspicious_execution_from_vscode_extension.toml

* Update initial_access_suspicious_execution_from_vscode_extension.toml
2026-03-09 16:22:41 +00:00
Ruben Groenewoud 39cdb3887f [New/Tuning] TeamPCP Simulation - New & Tuned Rules (#5812)
* [New/Tuning] TeamPCP Simulation - New & Tuned Rules

* ++

* ++

* Added IGs

* Update event action conditions in TOML rule

Refactor process event conditions for clarity.

* Add cloud-related file access patterns to rules

* Update persistence_suspicious_webserver_child_process_execution.toml

* Update rules/integrations/cloud_defend/defense_evasion_file_creation_execution_deletion_cradle.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update defense_evasion_file_creation_execution_deletion_cradle.toml

* Update defense_evasion_file_creation_execution_deletion_cradle.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-03-09 17:03:39 +01:00
Samirbous 2276987104 [New] Elastic Defend Alert from GenAI Utility or Descendant (#5793)
* [New] Elastic Defend Alert from GenAI Utility or Descendant

Detects Elastic Defend alerts (behavior, malicious file, memory signature, shellcode) where the alerted process or its direct parent is a GenAI coding or assistant utility

* Rename multiple_alerts_elastic_defend_genai_utility_descendant.toml to initial_access_elastic_defend_genai_utility_descendant.toml

* Update initial_access_elastic_defend_genai_utility_descendant.toml

* Rename initial_access_elastic_defend_genai_utility_descendant.toml to initial_access_elastic_defend_alert_genai_utility_descendant.toml

* Update initial_access_elastic_defend_alert_genai_utility_descendant.toml

* ++

* ++

* ++

* Update initial_access_elastic_defend_alert_genai_utility_descendant.toml

* Update initial_access_elastic_defend_alert_genai_utility_descendant.toml

* Update initial_access_elastic_defend_alert_genai_utility_descendant.toml

* Update rules/cross-platform/initial_access_elastic_defend_alert_genai_utility_descendant.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update rules/cross-platform/initial_access_elastic_defend_alert_genai_utility_descendant.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-03-09 15:53:25 +00:00
Samirbous a7c34ebf3b [New] Potential Account Takeover - Logon from New Source IP (#5770)
* [New] Potential Account Takeover - Logon from New Source IP

* Update credential_access_account_takeover_new_source_ip.toml

* Update credential_access_account_takeover_new_source_ip.toml

* Update privilege_escalation_takeover_new_source_ip.toml

* ++

* Update privilege_escalation_account_takeover_mixed_logon_types.toml

* Update privilege_escalation_account_takeover_mixed_logon_types.toml

* Update rules/windows/privilege_escalation_takeover_new_source_ip.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update rules/windows/privilege_escalation_account_takeover_mixed_logon_types.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-03-09 15:33:57 +00:00
Ruben Groenewoud 99bdb22a8d [Rule Tuning] Base64 Decoded Payload Piped to Interpreter (#5811) 2026-03-09 15:06:14 +01:00
Eric Forte 94c73e3ad7 [FR] Minor Typo Fixes (#5784) 2026-03-06 16:12:45 -06:00
Ruben Groenewoud c24f84b5b0 [Rule Tuning] kubernetes.audit.userAgent --> user_agent.original Conversion (#5808) 2026-03-05 14:13:30 +01:00
Eric Forte a9f3f8afbb Do not fire on denied events (#5805) 2026-03-04 14:05:50 -05:00
Isai 1e777d9be7 [Rule Tuning] AWS STS Role Assumption by User (#5796)
* [Rule Tuning] AWS STS Role Assumption by User

Removed AssumedRole from the `aws.cloudtrail.user_identity.type` filter to eliminate redundancy with the AWS STS Role Chaining rule. The AWS STS Role Chaining rule already covers AssumedRole identity types assuming other roles. This change ensures each rule has distinct coverage without overlapping alerts.

- Changed query filter from `aws.cloudtrail.user_identity.type: ("AssumedRole" or "IAMUser")` to `aws.cloudtrail.user_identity.type: "IAMUser"`
- Updated description to clarify the rule focuses on user-initiated role assumptions
- Minor formatting fixes to investigation guide headings

* reducing new_terms fields

reducing new_terms fields to only use "aws.cloudtrail.user_identity.arn" since we do not have to account for roles, this field is unique for IAMUsers
2026-03-04 13:01:49 -05:00
yuriShafet 4233059510 [Rule Tuning] Unusual Process For a Windows Host - from for 6h bucket span (#5797) 2026-03-03 14:56:30 -05:00
Samirbous dc7d8960de [Tuning] LSASS Process Access via Windows API (#5807)
* Update credential_access_lsass_openprocess_api.toml

* Update credential_access_lsass_openprocess_api.toml
2026-03-03 19:05:47 +00:00
Ruben Groenewoud aaf99b1873 [Rule Tuning] agent.id --> host.id new_terms Key Modification (#5802)
* [Rule Tuning] `agent.id` --> `host.id` Migration

* Updated_date bump
2026-03-02 13:24:25 +01:00
Samirbous 52adb7187f Update impact_alerts_on_host_with_cpu_spike.toml (#5789) 2026-02-27 08:56:27 +00:00
Isai c5dbd90662 [Rule Tunings] Add Console Session Filtering to AWS Temporary Credential Detection Rules (#5781)
* [Rule Tuningw] Add Console Session Filtering to AWS Temporary Credential Detection Rules

Added `aws.cloudtrail.session_credential_from_console` field filtering to 2 rules to reduce false positives from legitimate console login sessions. Console logins automatically issue temporary "ASIA" credentials, which previously triggered alerts for rules monitoring session token abuse.

- Updated false positives sections to reflect automatic console session filtering
- Updated investigation guides to note that alerts indicate non-console temporary credential usage
- min_stack_version = "9.2.0" because this field was introduced in AWS Integration version 4.6.0. 9.2.0 is the earliest major stack version supported.

Impact
- Significantly reduces false positives from legitimate AWS Management Console usage
- Improves rule fidelity by focusing detection on programmatic abuse of temporary credentials (CLI, SDK, stolen credentials)

* update boolean field value for aws.cloudtrail.session_credential_from_console

update boolean field value for aws.cloudtrail.session_credential_from_console

* removing filebeat compatibility

removing filebeat compatibility
2026-02-26 17:21:18 -05:00
Terrance DeJesus 5ecbc0f0b9 [New Rule] Microsoft 365 SharePoint/OneDrive Sensitive Search and File Access (#5777)
* [New Rule] Microsoft 365 SharePoint/OneDrive Sensitive Search and File Access
Fixes #5776

* adjusting UUIDs

* added additional strings

* adjusted investigation guide

* fixed mitre mappings

* fixed mitre mappings

* Apply suggestion from @terrancedejesus
2026-02-26 14:29:14 -05:00
Terrance DeJesus 71c461d867 [New Rule] M365 MFA Notification Email Deleted or Moved (#5779)
* [New Rule] M365 MFA Notification Email Deleted or Moved
Fixes #5778

* updated non-ecs

* adjusted rule name

* Apply suggestion from @terrancedejesus
2026-02-26 13:21:08 -05:00
Terrance DeJesus 8593116f58 [New Rule] Okta User Authentication via Proxy Followed by Security Alert (#5752)
* [New Rule] Okta User Authentication via Proxy Followed by Security Alert
Fixes #5751

* adjusted to EQL

* fixed syntax

* Update rules/integrations/okta/initial_access_first_occurrence_user_session_started_via_proxy.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* removed defense evasion; adjusted maxspan to 30m

* removed Okta tag

* adding Okta back as integration tag

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
2026-02-26 11:32:25 -05:00
Terrance DeJesus 04ad018f27 [Rule Tuning] M365 OneDrive/SharePoint Excessive File Downloads (#5767)
* [Rule Tuning] M365 OneDrive/SharePoint Excessive File Downloads
Fixes #5766

* updated non-ecs

* fixing keep command
2026-02-26 10:38:59 -05:00
Eric Forte 4201fe6f8a [Rule Tuning] Telnet Authentication Bypass Rule Tuning (#5771)
* Add xinetd in process names
2026-02-25 15:43:18 -05:00
Eric Forte b2f76bd2c9 Tuning to allow for greater flexibility in integration policy (#5774) 2026-02-25 13:56:02 -05:00
Terrance DeJesus 013dace20f adjusted min-stack (#5763) 2026-02-23 17:31:36 -05:00
Terrance DeJesus 35a8298bda [Rule Tuning] Entra ID Federated Identity Credential Issuer Modified (#5760)
* added min-stack

* Apply suggestion from @terrancedejesus
2026-02-23 12:43:16 -05:00
Jonhnathan 5ddca45adf [Rule Tuning] Windows Misc Tuning - 2 (#5758)
* [Rule Tuning] Windows Misc Tuning - 2

* Apply suggestion from @w0rk3r
2026-02-23 13:09:19 -03:00
Ruben Groenewoud c349c8eca7 [New Rules] Kernel Discovery & BPF Load/Tampering via bpftool (#5743)
* [New Rules] BPF Load & Tampering via bpftool

* Update persistence_bpf_program_or_map_load.toml

* [New Rule] Kernel Instrumentation Discovery via kprobes and tracefs

* Update defense_evasion_bpf_program_tampering.toml

* Update persistence_bpf_program_or_map_load.toml

* Enhance note with investigation and response details

Added detailed investigation guide and response steps for kernel instrumentation discovery via kprobes and tracefs.
2026-02-23 16:33:17 +01:00
Samirbous 1e9b9d6d46 [New] FortiGate SSL VPN Login Followed by SIEM Alert by User (#5757)
* [New] FortiGate SSL VPN Login Followed by SIEM Alert by User

Detects when a FortiGate SSL VPN login event is followed by any SIEM detection alert for the same user name within a short time window. This correlation can indicate abuse of VPN access for malicious activity, credential compromise used from a VPN session, or initial access via VPN followed by post-compromise behavior.

* Update initial_access_fortigate_ssl_vpn_login_followed_by_siem_alert.toml

* Update initial_access_fortigate_ssl_vpn_login_followed_by_siem_alert.toml

* Update initial_access_fortigate_ssl_vpn_login_followed_by_siem_alert.toml
2026-02-23 15:23:08 +00:00
Ruben Groenewoud 56c737c1d0 [New/Tuning] New LKM Load Rule & FN Tuning Tunneling Rules (#5742)
* [New/Tuning] New LKM Load Rule & FN Tuning Tunneling Rules

* ++

* Update persistence_kernel_module_load_from_unusual_location.toml

* Update persistence_kernel_module_load_from_unusual_location.toml

* Apply suggestion from @Aegrah

* Update persistence_kernel_module_load_from_unusual_location.toml
2026-02-23 10:01:42 +01:00
Ruben Groenewoud e012e88342 [Rule Tuning] Kernel Module Load via Built-in Utility (#5736)
* [Rule Tuning] Kernel Module Load via Built-in Utility

* Apply suggestion from @eric-forte-elastic

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Refine process.args conditions for modprobe

* Refactor notes and references in kernel module load rule

Removed detailed notes and investigation steps related to kernel module loading via insmod utility. Updated note section and added a reference link.

* Update persistence_insmod_kernel_module_load.toml

* Update persistence_insmod_kernel_module_load.toml

* Update kernel module load rule for clarity and tactics

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-02-23 09:48:12 +01:00
Samirbous 3e9b8bcdc7 [Tuning] Newly Seen FG or Suricata alert (#5734)
* [Tuning] Newly Seen FG or Suricata alert

excludes common FPs.

* Update rules/cross-platform/newly_observed_fortigate_alert.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-02-23 08:35:38 +00:00
Mika Ayenson, PhD ccb2d5e3b6 [Rule Tuning] LLM Completion Rules (#5744) 2026-02-20 14:43:12 -06:00
Terrance DeJesus 6a7c1e9674 [Rule Deprecation] Deprecate Individual MSFT Compliance Rules (#5679)
* [Rule Tuning] Deprecate Individual MSFT Defender Rules / Create BBR MSFT Defender Rule
Fixes #5678

* adjusted naming; fixed mitre match

* adding M365 Exchange DLP Policy Deleted to deprecation

* adjusted BBR naming to represent Purview and not Defender

* added tactic tags

* adding filebeat

* removed new rule
2026-02-20 14:00:34 -05:00
Terrance DeJesus c7954465f3 [Rule Tuning] Okta Credential Stuffing, Password Spraying, and Brute Force Detection Improvements (#5723)
* [Rule Tuning] Okta Credential Stuffing, Password Spraying, and Brute Force Detection Improvements
Fixes #5722

* adding adjustments

* adjusts made; still testing

* adjustments to logic; names; tags; standardization, etc.

* added missing tag

* updated reference rules
2026-02-20 13:36:25 -05:00
Jonhnathan 3d647feb8c [Rule Tuning] Windows Misc Tunings (#5740)
* [Rule Tuning] Windows Misc Tunings

* ++

* Update defense_evasion_wsl_child_process.toml

* Update execution_powershell_susp_args_via_winscript.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-02-20 14:11:35 -03:00
Samirbous 8ae6c4fd23 [New] Correlated Alerts on Similar User Identities (#5726)
* [New] Correlated Alerts on Similar User Identities

This rule correlates alerts from multiple integrations and event categories that involve different user.name values which
may represent the same real-world identity. It uses an LLM-based similarity analysis to evaluate whether multiple user identifiers
(e.g. naming variations, formats, aliases, or domain differences) likely belong to the same person.

* Update multiple_alerts_llm_by_user_entity.toml

* Update multiple_alerts_llm_by_user_entity.toml

* Update multiple_alerts_llm_by_user_entity.toml

* Update multiple_alerts_llm_by_user_entity.toml

* Update rules/cross-platform/multiple_alerts_llm_by_user_entity.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update multiple_alerts_llm_by_user_entity.toml

* Apply suggestion from @terrancedejesus

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update multiple_alerts_llm_by_user_entity.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2026-02-20 15:57:34 +00:00
Isai 62aa4dcedc [Rule Tuning] Potential AWS S3 Bucket Ransomware Note Uploaded (#5739)
Tuning based on telemetry from recent rule version 9. There are many false positives for what look like typical S3 storage object names like `BillingInformation`, `InstanceInformation` created by AWS Service accounts. I'm excluding AWS service account types from the rule for now which eliminated ~97% of the false positives over last 30 days. leaving only 66 which is acceptable for this rule and should be addressed via local exclusions.

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-02-20 10:41:42 -05:00
Samirbous d358641c45 [New] Multiple Rare Elastic Defend Behavior Rules by Host (#5738)
* [New] Multiple Rare Elastic Defend Behavior Rules by Host

Identifies hosts that triggered multiple distinct Elastic Defend behavior rules, while reducing false positives by
considering only behavior rules that appear on a single host globally (via INLINE STATS). Hosts with two or more
such rare behavior rules are more likely to be compromised and warrant prioritized triage.

* Update multiple_elastic_defend_behavior_rules_same_host_prevalence.toml

* Update multiple_elastic_defend_behavior_rules_same_host_prevalence.toml

* Update multiple_elastic_defend_behavior_rules_same_host_prevalence.toml

* Update multiple_elastic_defend_behavior_rules_same_host_prevalence.toml

* Update multiple_elastic_defend_behavior_rules_same_host_prevalence.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-02-20 09:40:42 +00:00
Terrance DeJesus f773103519 [Rule Tuning] Entra ID Federated Identity Credential Persistence Detection (#5702)
* [Rule Tuning] Entra ID Federated Identity Credential Persistence Detection
Fixes #5701

* updated mitre mapping ID

* adjusted mitre mappings; non-ecs schema file

* fixed trailing comma in non-ecs; adjusted file name

* adjusted file name; fixed non-ecs schema for upstream ESQL validation

* Apply suggestion from @terrancedejesus

* Apply suggestion from @terrancedejesus

* changed lookback to 9 minutes; adjusted keep values

* added setup; added tag
2026-02-19 15:58:12 -05:00
Eric Forte 4278521811 [Rule Tuning] Accepted Default Telnet Port Connection (#5737)
* Remove event type end from results
2026-02-19 15:15:51 -05:00
Terrance DeJesus 63f76cf004 [Rule Tuning] Entra ID SharePoint Accessed by Unusual User and Microsoft Authentication Broker Client (#5681)
* [Rule Tuning] Transform Dormant SharePoint Rule to Detect OAuth Phishing
Fixes #5680

* adjusted query format for unit test; added additional domain tag for storage

* Apply suggestion from @terrancedejesus

* Fix formatting in non-ecs-schema.json

* adjusted description

* re-order mappings
2026-02-19 10:09:15 -05:00
Samirbous cf6472005a [Tuning] High Order Rules fine tuning (#5728)
* [Tuning] High Order Rules fine tuning

- Exclude High Order Rules as input by other HORs to avoid recursive alerting.
- Adjusted the rule name for one rule.
- FTS Detection rule using ES|QL - moved the `Esql.rule_name_values = VALUES(kibana.alert.rule.name)` to preserve the original alert name (it get confused with the HOR alert name).

* Update impact_alert_from_a_process_with_cpu_spike.toml

* Update command_and_control_socks_fortigate_endpoint.toml

* Update lateral_movement_multi_alerts_new_srcip.toml

* ++

* Update impact_alerts_on_host_with_cpu_spike.toml

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update multiple_alerts_from_different_modules_by_user.toml
2026-02-18 23:31:56 +00:00
Terrance DeJesus dbbf71b9c2 [Rule Tuning] Entra ID Suspicious Cloud Device Registration (#5683)
* [Rule Tuning] Entra ID Suspicious Cloud Device Registration
Fixes #5682

* fixed investigation guide name

* adjusted from to 30m and interval to 15m
2026-02-18 17:37:17 -05:00
Isai e633c83b73 [New Rule] AWS SSM Inventory Reconnaissance by Rare User (#5724)
* [New Rule] AWS SSM Inventory Reconnaissance by Rare User

This rule detects the first time a user or role accesses AWS Systems Manager (SSM) inventory APIs or runs the AWS-GatherSoftwareInventory job. SSM Inventory provides detailed information about managed EC2 instances including installed software, patch compliance, network configurations, and command execution history. Threat actors, including Scattered Spider (LUCR-3), have been observed leveraging these APIs to enumerate targets for lateral movement while blending in with legitimate AWS operations. The rule uses a New Terms approach on cloud.account.id and user.name to identify when users access these reconnaissance APIs for the first time.

No existing rules specifically detect SSM inventory reconnaissance activity. This fills a gap in detecting cloud infrastructure discovery techniques used for target enumeration prior to lateral movement.

| API | Purpose |
|-----|---------|
| `GetInventory` | Query inventory data (installed software, OS details) |
| `GetInventorySchema` | Discover available inventory types |
| `ListInventoryEntries` | Get specific instance inventory |
| `DescribeInstancePatches` | Find patch compliance/vulnerabilities |
| `ListCommands` | View SSM command execution history |
| `CreateAssociation` | Trigger AWS-GatherSoftwareInventory job |

* Apply suggestions from code review
2026-02-18 15:50:14 -05:00
Isai f10de64527 [New Rule] AWS Sensitive IAM Operations Performed via CloudShell (#5718)
* [New Rule] AWS Sensitive IAM Operations Performed via CloudShell

This rule detects sensitive AWS IAM operations performed via CloudShell based on the user agent string. CloudShell is a browser-based shell that provides command-line access to AWS resources directly from the console without requiring local tooling. When attackers gain access to a compromised console session, CloudShell enables them to perform privileged operations such as creating users, access keys, roles, or attaching policies—leaving no artifacts on their local system. This behavior is documented in the Permiso blog on LUCR-3 (Scattered Spider) and the CISA Scattered Spider advisory, where threat actors leveraged CloudShell for post-compromise credential harvesting and privilege escalation.

No existing rules specifically detect CloudShell as the origin for sensitive IAM operations. This fills a gap by identifying high-risk actions from this browser-based execution context.

* adding iam provider

* primary tactic change

* updating highlighted fields

* removed bold from IG

* Apply suggestions from code review

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-02-18 15:29:53 -05:00
Isai f62026e378 [New Rules] AWS IAM new identity federation provider rules (#5691)
* [New Rules] AWS IAM new identity federation provider rules

AWS IAM SAML Provider Created and AWS IAM OIDC Provider Created by Rare User detect the creation of new identity federation providers in AWS IAM. SAML and OIDC providers establish trust relationships with external identity providers, enabling federated access to AWS resources. Adversaries who gain administrative access may create rogue providers to establish persistent access that survives credential rotation, allowing them to assume roles using tokens from an IdP they control. These rules map to MITRE ATT&CK T1484.002 (Trust Modification), which is referenced in the CISA Scattered Spider advisory (AA23-320A) under the Privilege Escalation tactic.

Existing Related Coverage: We already detect `UpdateSAMLProvider` via privilege_escalation_iam_saml_provider_updated.toml. These new rules close the gap by detecting the creation of federation providers, the initial step required to establish rogue trust relationships.

* Update rules/integrations/aws/persistence_iam_oidc_provider_created.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/integrations/aws/persistence_iam_oidc_provider_created.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Apply suggestion from @imays11

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-02-18 15:17:13 -05:00
Samirbous 204f0b2ebc [Tuning] Adds host metadata to the setup requirements (#5719)
* [Tuning] Adds host metadata to the setup requirements

Rules requiring host.ip and that are compatible with Elastic Defend integration can be impacting by windows].advanced.set_extended_host_information if set to the default value (false), host.ip won't be populated from 8.18+ (only host.name and host.os and host.id).

Related SDH https://github.com/elastic/sdh-endpoint/issues/722

* ++

* Update rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_process_args.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_session_duration.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_high_remote_file_size.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_high_variance_rdp_session_duration.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_rare_remote_file_directory.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_unusual_time_for_an_rdp_session.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_spike_in_connections_from_a_source_ip.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_rare_remote_file_extension.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/lmd/lateral_movement_ml_spike_in_connections_to_a_destination_ip.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update lateral_movement_ml_spike_in_rdp_processes.toml

* Apply suggestion from @Mikaayenson

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-02-18 17:04:40 +00:00