Commit Graph

3372 Commits

Author SHA1 Message Date
Sergey Polzunov 3ce5379ef5 README fixes (#5616)
* Small fixes

* Version bump

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-02-03 16:22:17 -06:00
Terrance DeJesus c75fc7e487 [Rule Tuning] Mythic C2 AzureBlob Profile Endpoints (#5663)
Fixes #5662
2026-02-03 09:38:14 -05:00
Terrance DeJesus ae88c095e9 [New Rule] Fortigate (FG-IR-26-060) Detections (#5641)
* initial FG-IR-26-060 rules

* adjusted investigation guides to proper formatting

* Update initial_access_fortigate_sso_login_from_unusual_source.toml

* Update and rename exfiltration_fortigate_config_download.toml to collection_fortigate_config_download.toml

* Update collection_fortigate_config_download.toml

* Apply suggestion from @Samirbous

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Apply suggestion from @Samirbous

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Apply suggestion from @Samirbous

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Apply suggestion from @Samirbous

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* adjusting rules

* revert super admin

* adjusted source.ip to 'fortinet.firewall.ui'

* changing ESQL to EQL for non-aggregate queries

* added CISA reference

* adjusted interval and maxspan

* updating dates

* changed download rule to EQL

* added additional sso checks; linted previous rules

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-30 10:16:34 -05:00
Terrance DeJesus 6502ba61d7 [Rule Tuning] M365 Security Compliance Potential Ransomware Activity (#5653)
Fixes #5652
2026-01-30 09:57:56 -05:00
Samirbous efd1756d49 Update impact_hosts_file_modified.toml (#5655) 2026-01-29 17:02:14 +00:00
Terrance DeJesus fa56ae556e [New Rule] Okta AiTM Session Cookie Replay Detection (#5627)
* New Rule: Okta AiTM Session Cookie Replay Detection
Fixes #5626

* added keep; linted

* adjusted logic to include UA 2+, fixed MITRE Mappings

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-29 08:58:59 -05:00
Samirbous a2c1dd8575 [New] Suspicious FortiGate and Fortinet Logon rules (#5640)
* [New] Suspicious FortiGate Admin Logon rules

- First-Time FortiGate Administrator Login
- FortiGate Administrator Login from Multiple IP Addresses

* Update initial_access_fortigate_admin_login_multi_srcip.toml

* ++

* ++

* Create initial_access_newly_observed_frotinet_logon.toml

* Update initial_access_newly_observed_frotinet_logon.toml

* build schema and manifest for fortinet

* Update pyproject.toml

* Update initial_access_newly_observed_frotinet_logon.toml

* Revert "Update initial_access_newly_observed_frotinet_logon.toml"

This reverts commit 7b99828b9a28a8ad9cd156fbe33c92ea436041e0.

* Revert "Update pyproject.toml"

This reverts commit 025daf566fa1f2d7dffd83717f5a70a8285d62ca.

* Revert "build schema and manifest for fortinet"

This reverts commit a6234164f827b65a3d4b7580ef647bfefc34b658.

* ++
2026-01-28 17:56:56 +00:00
Samirbous cee9f51b6d [New] Newly Observed Process Exhibiting CPU Spike (#5635)
* [New] Newly Observed Process Exhibiting CPU Spike

This rule alerts on processes exhibiting CPU spike and that are observed for the first time in the previous 5 days. This behavior may indicate performance issues as well as potential suspicious software like cryptomining or exploit abusing system resources following compromise.

* Update impact_newly_observed_process_with_high_cpu.toml

* Update impact_newly_observed_process_with_high_cpu.toml

* Update impact_newly_observed_process_with_high_cpu.toml

* Update impact_newly_observed_process_with_high_cpu.toml

* Update rules/cross-platform/impact_newly_observed_process_with_high_cpu.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update impact_newly_observed_process_with_high_cpu.toml

* Update impact_newly_observed_process_with_high_cpu.toml

* Update impact_newly_observed_process_with_high_cpu.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-28 17:38:22 +00:00
github-actions[bot] 8b8c0beec7 Lock versions for releases: 8.19,9.1,9.2,9.3 (#5639) 2026-01-28 18:37:52 +05:30
Eric Forte d252cae4ee Ignore Keep * for ES|QL hash calc (#5638)
* Ignore Keep * for ES|QL hash calc

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>


---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-27 23:01:27 -05:00
Eric Forte 2265717c41 chore: Fix lock version for 9.3.2 Release (#5634)
* Min stack mv_contains
2026-01-27 22:38:39 -05:00
Eric Forte 070b457659 Test remote_cli update test indices 2026-01-27 20:08:19 +05:30
shashank-elastic 3ee0a72a65 Add investigation guides (#5630) 2026-01-27 14:28:06 +05:30
Eric Forte 7ff19b3497 [Rule Tuning] Accepted Default Telnet Port Connection (#5629)
* Add Additional Data Sources
2026-01-26 20:43:23 -05:00
Jonhnathan 2f9dc7af53 [Rule Tuning] PowerShell Rules Revamp - 2 (#5623)
* [Rule Tuning] PowerShell Rules Revamp - 2

* Update credential_access_mimikatz_powershell_module.toml

* Apply suggestions from code review
2026-01-26 19:35:05 -03:00
Jonhnathan 6843d11b09 [Rule Tuning] PowerShell Rules Revamp - 3 (#5625)
* [Rule Tuning] PowerShell Rules Revamp - 3

* Apply suggestion from @w0rk3r
2026-01-26 19:11:29 -03:00
Jonhnathan fc55e8b308 [Rule Tuning] PowerShell Rules Revamp - 1 (#5619)
* [Rule Tuning] PowerShell Rules Revamp - 1

* bump
2026-01-26 19:01:48 -03:00
Samirbous 42e7f3b4ce [New] Multiple Alerts on a Host Exhibiting CPU Spike (#5621)
* [New] Multiple Alerts on a Host Exhibiting CPU Spike

This rule correlates multiple security alerts from a host exhibiting unusually high CPU utilization within a short time window. This behavior may indicate malicious activity such as malware execution, cryptomining, exploit payload execution, or abuse of system resources following initial compromise.

* Update multiple_alerts_on_host_with_cpu_spike.toml

* Rename multiple_alerts_on_host_with_cpu_spike.toml to impact_alerts_on_host_with_cpu_spike.toml

* Update impact_alerts_on_host_with_cpu_spike.toml

* Update rules/cross-platform/impact_alerts_on_host_with_cpu_spike.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update non-ecs-schema.json

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 20:42:20 +00:00
Terrance DeJesus b311044624 [Rule Tuning] Entra ID OAuth Phishing via First-Party Microsoft Application (#5610)
Fixes #5609
2026-01-26 14:55:18 -05:00
Samirbous 094f907144 [New] Detection Alert on a Process Exhibiting CPU Spike (#5617)
* [New] Detection Alert on a Process Exhibiting CPU Spike

This rule correlates security alerts with processes exhibiting unusually high CPU utilization on the same host and process ID within a short time window. This behavior may indicate malicious activity such as malware execution, cryptomining, exploit payload execution, or abuse of system resources following initial compromise.

* Update securityt_alert_from_a_process_with_cpu_spike.toml

* Update securityt_alert_from_a_process_with_cpu_spike.toml

* Update rules/cross-platform/securityt_alert_from_a_process_with_cpu_spike.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Rename securityt_alert_from_a_process_with_cpu_spike.toml to security_alert_from_a_process_with_cpu_spike.toml

* Update security_alert_from_a_process_with_cpu_spike.toml

* Rename security_alert_from_a_process_with_cpu_spike.toml to impact_alert_from_a_process_with_cpu_spike.toml

* Update impact_alert_from_a_process_with_cpu_spike.toml

* Update non-ecs-schema.json

* Update rules/cross-platform/impact_alert_from_a_process_with_cpu_spike.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-01-26 17:42:31 +00:00
Samirbous 6d9eef48b0 [New] Multiple Vulnerabilities by Asset via Wiz (#5598)
* [New] Wiz - Multiple Vulnerabilities by Container

* Update multiple_vulnerabilities_wiz_by_container.toml

* Update multiple_vulnerabilities_wiz_by_container.toml

* add wiz manif and schema

* Update multiple_vulnerabilities_wiz_by_container.toml

* Update multiple_vulnerabilities_wiz_by_container.toml

* Update pyproject.toml

* Update multiple_vulnerabilities_wiz_by_container.toml

* ++

* Update external_alerts.toml

* Update multiple_vulnerabilities_wiz_by_container.toml

* Delete detection_rules/etc/integration-manifests.json.gz

* Revert "add wiz manif and schema"

This reverts commit a1e9e7440dcb46ea2abebec834cfc0291e3b60ae.

* Revert "Update pyproject.toml"

This reverts commit 47ab9d2dc8239207126b8512006f353a3fd4affc.

* update manifest and schema for wiz
2026-01-26 17:26:17 +00:00
Samirbous 88e0b14709 [Tuning] ESQL Dynamic unique value fields (#5569)
* [Tuning] Extract dynamic field with 1 value to ECS fields for alerts exclusion

Extract dynamic field with 1 value to ECS fields for alerts exclusion:

Esql.host_id_values -> host.is
Esql.agent_id_values -> agent.id
Esql.host_name_values -> host.name

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update newly_observed_elastic_defend_alert.toml

* Update defense_evasion_base64_decoding_activity.toml

* Update discovery_subnet_scanning_activity_from_compromised_host.toml

* Update persistence_web_server_sus_command_execution.toml

* Update persistence_web_server_sus_child_spawned.toml

* Update rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/linux/impact_potential_bruteforce_malware_infection.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/newly_observed_elastic_defend_alert.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/newly_observed_elastic_detection_rule.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/windows/credential_access_rare_webdav_destination.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update credential_access_rare_webdav_destination.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 16:34:16 +00:00
Samirbous edf28367e4 [New] Lateral Movement Alerts from a Newly Observed Entity (#5557)
* [New] Lateral Movement Alerts from a Newly Observed Entity

High-order rules to prioritize lateral movement alerts triage (detects multiple lateral movement alerts from a source.ip or user.id that was observed for the first time in the previous 5 days).

* Update lateral_movement_multi_alerts_new_userid.toml

* Update lateral_movement_multi_alerts_new_srcip.toml

* Update lateral_movement_multi_alerts_new_userid.toml

* Update lateral_movement_multi_alerts_new_userid.toml

* Update lateral_movement_multi_alerts_new_userid.toml

* Update rules/cross-platform/lateral_movement_multi_alerts_new_srcip.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/lateral_movement_multi_alerts_new_userid.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/lateral_movement_multi_alerts_new_srcip.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/lateral_movement_multi_alerts_new_userid.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/lateral_movement_multi_alerts_new_srcip.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/lateral_movement_multi_alerts_new_userid.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Apply suggestion from @Mikaayenson

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update lateral_movement_multi_alerts_new_userid.toml

* Update lateral_movement_multi_alerts_new_srcip.toml

* Update lateral_movement_multi_alerts_new_userid.toml

* Update lateral_movement_multi_alerts_new_userid.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 16:21:27 +00:00
Ruben Groenewoud 6626475119 [Rule Tuning] Several Community DR Issues (#5615)
* [Rule Tuning] Suspicious Network Connection via systemd

* [Rule Tuning] Systemd-udevd Rule File Creation

* ++
2026-01-26 17:08:49 +01:00
Ruben Groenewoud c5b64c9fbf [New/Tuning] General API Abuse D4C/K8s Rules (#5591)
* [New/Tuning] General API Abuse D4C/K8s Rules

* [New Rule] DNS Enumeration Detected via Defend for Containers

* [New Rule] Tool Enumeration Detected via Defend for Containers

* [New Rule] Tool Installation Detected via Defend for Containers

* Service Account File Reads

* [New Rule] Direct Interactive Kubernetes API Request Detected via Defend for Containers

* Rule name update

* [New Rules] D4C K8S MDA API Request Rules

* Add 'tor' to the list of allowed process args

* ++

* ++

* Update rules/integrations/kubernetes/execution_user_exec_to_pod.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update description

* Update rules/integrations/cloud_defend/execution_tool_installation.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/cloud_defend/execution_tool_installation.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/integrations/cloud_defend/execution_tool_installation.toml

* Update non-ecs-schema.json

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 16:59:14 +01:00
Ruben Groenewoud 57599e3796 [New Rule] Curl SOCKS Proxy Detected via Defend for Containers (#5596)
* [New Rule] Curl SOCKS Proxy Detected via Defend for Containers

* Added reference

* Update rules/integrations/cloud_defend/command_and_control_curl_socks_proxy_detected_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update time range for cloud defend rule

* Update rules/integrations/cloud_defend/command_and_control_curl_socks_proxy_detected_inside_container.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-26 16:46:59 +01:00
Ruben Groenewoud fe4418d7f5 [New Rules] Reintroduction of Defend for Containers (D4C) Ruleset (#5561)
* [New Rules] Reintroduction of Defend for Containers (D4C) Ruleset

* ++

* Removed Reintroduced Rules from Deprecated Folder

* Updated Rule Names

* Added maturity field

* [Update] Large D4C Compatibility Overhaul

* Added busybox

* Remove file that was accidently added in this PR

* Creation date revert

* ++

* Update pyproject.toml

* ++

* ++

* Update

* Update schemas/manifests

* ++
2026-01-26 16:37:34 +01:00
Samirbous 3b6302a0c5 Update credential_access_multi_could_secrets_via_api.toml (#5618) 2026-01-26 15:21:18 +00:00
Mika Ayenson, PhD bbe83452b4 Revert "[Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules (#5578)" (#5620)
This reverts commit c608b673bf.
2026-01-26 08:31:53 -06:00
Samirbous 7221db6b36 [Tuning] Potential Ransomware Behavior - Note Files by System (#5595)
* [Tuning] Potential Ransomware Behavior - Note Files by System

added host.id and removed noisy patterns (writes to non C drive)

* Update impact_high_freq_file_renames_by_kernel.toml

* Apply suggestion from @Mikaayenson

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update impact_high_freq_file_renames_by_kernel.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 13:15:54 +00:00
Samirbous 30c7833f08 [Tuning] Rare Connection to WebDAV Target (#5604)
* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml
2026-01-26 12:51:09 +00:00
Ruben Groenewoud c608b673bf [Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules (#5578)
* [Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules

* Update manifests & schemas

* [New/Updated] Migrated `process.command_line` --> `process.args` for Compatibility

* Pyproject.toml Patch

* ++
2026-01-26 13:28:08 +01:00
Sergey Polzunov 5b092d7831 [fix] Preserve actions[].params.message field formatting during rule export from the repo (#5597)
* Preserve `message` field formatting

* Note the JSON path explicitely in the comment

* version bump fix
2026-01-26 13:04:36 +01:00
Samirbous 3497c7b0b5 [New] Potential Telnet Authentication Bypass (CVE-2026-24061) (#5612)
* [New] Potential Telnet Authentication Bypass (CVE-2026-24061)

https://www.safebreach.com/blog/safebreach-labs-root-cause-analysis-and-poc-exploit-for-cve-2026-24061/"

https://security-tracker.debian.org/tracker/CVE-2026-24061

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Apply suggestion from @Aegrah

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update initial_access_telnet_auth_bypass_via_user_envar.toml

* Update rules/linux/initial_access_telnet_auth_bypass_via_user_envar.toml

* added rule for auditd

* Update rules/linux/initial_access_telnet_auth_bypass_envar_auditd.toml

* Update rules/linux/initial_access_telnet_auth_bypass_envar_auditd.toml

* Update initial_access_telnet_auth_bypass_envar_auditd.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-01-26 10:18:23 +00:00
Aaron Jewitt 5fff45ec93 Added logic to main.py to use the created_at and updated_at values if they exist (#5444)
* Added logic to main.py to use the created_at and updated_at values from the ndjson file if they exist.

* Add comment for parsing created_at and updated_at fields to metadata

* updated the date metadata code based on PR feedback

* Add --dates-import option to rule import command

Introduce a new option `--dates-import` to parse `created_at` and `updated_at` fields from rule content. This allows users to import date metadata while preventing conflicts with existing date options.

* Update version to 1.5.23 for release preparation

This update increments the version number in the project metadata
to reflect the upcoming release. No other changes were made.

* Update date metadata logic to include timezone information

Modified the handling of creation and updated dates to ensure
that the datetime objects are timezone-aware by replacing the
timezone info with UTC. This change improves the accuracy of
date metadata in the rules.

* Updated format of main.py using ruff

* Update project version to 1.5.29

* updating pyproject version

---------

Co-authored-by: Sergey Polzunov <traut@users.noreply.github.com>
2026-01-26 11:00:45 +01:00
Terrance DeJesus 6c555aaba4 [Rule Tuning] Entra ID OAuth Authorization Code Grant for Unusual User, App, and Resource (#5589)
Fixes #5588
2026-01-24 08:51:23 -05:00
Terrance DeJesus 04b99c8ec1 [Rule Tuning] Entra ID OAuth Device Code Flow with Concurrent Sign-ins (#5594)
Fixes #5593
2026-01-23 16:25:51 -05:00
Terrance DeJesus 15aacaba70 [Rule Tuning] M365 Threat Intelligence Signal (#5587)
* [Rule Tuning] M365 Threat Intelligence Signal
Fixes #5586

* updating date

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-23 15:45:05 -05:00
Samirbous 8b1764071b [New] Newly Observed Network Alert (#5585)
* [New] Newly Observed High Severity Suricata Alert

* Update newly_observed_suricata_high_severity_alert.toml

* Update newly_observed_suricata_high_severity_alert.toml

* Update newly_observed_suricata_high_severity_alert.toml

* Update newly_observed_suricata_high_severity_alert.toml

* ++

* ++

* Update newly_observed_fortigate_alert.toml

* Update newly_observed_fortigate_alert.toml

* ++

* Update newly_observed_panos_alert.toml

* Update rules/cross-platform/newly_observed_fortigate_alert.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/newly_observed_suricata_alert.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update newly_observed_fortigate_alert.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-23 12:22:21 +00:00
Samirbous e2c8c7745d [Tuning] Suricata and Elastic Defend Network Correlation (#5583)
* [Tuning] Suricata and Elastic Defend Network Correlation

Nessus is main source of noise.

* Update command_and_control_suricata_elastic_defend_c2.toml
2026-01-23 12:02:25 +00:00
Samirbous ccfb69244a [Tuning] Rare Connection to WebDAV Target (#5556)
* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml

* Update credential_access_rare_webdav_destination.toml
2026-01-23 11:17:19 +00:00
Ruben Groenewoud 4408ea014b [Rule Tuning] Removing host.os.type from K8s Rules (#5577) 2026-01-23 10:41:20 +01:00
Isai 4e4559204d [Rule Tunings] AWS remove target.entity.id and actor.entity.id fields (#5603)
* [Rule Tunings] AWS removal of target.entity.id and actor.entity.id fields

Related Issue : - https://github.com/elastic/security-team/issues/14019

`target.entity.id` and `related.entity.id` fields will soon be fully removed from the AWS Integration. This rule tuning replaces rule queries that relied on `target.entity.id` with the equivalent field `entity.target.id` which was introduced with AWS version 4.7.0 along with several new entity classification fields. This tuning also removes references to these fields in highlighted fields and investigation guides for several rules.

* update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml

update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml

* updated_dates

* [Rule Tunings] AWS remove target.entity.id and actor.entity.id fields

adding min_stack to rules using the field `entity.target.id`, we determined AWS version 4.7.0 is compatible with Kibana versions '^8.19.4 || ^9.1.4'. We reverted the initial PR and this one adds the min_stack_version.

Original PR: - https://github.com/elastic/detection-rules/pull/5563
______

### Issue Link
- https://github.com/elastic/ia-trade-team/issues/781

## Summary - What I changed

`target.entity.id` and `actor.entity.id` fields will soon be fully removed from the AWS Integration. This rule tuning replaces rule queries that relied on `target.entity.id` with the equivalent field `entity.target.id` which was introduced with AWS version 4.7.0 along with several new entity classification fields. This tuning also removes references to these fields in highlighted fields and investigation guides for several rules.

<img width="1622" height="1488" alt="image" src="https://github.com/user-attachments/assets/024fbdb2-c0e4-4785-9735-5285218e4fa9" />

## Rules with Query Changes

**AWS IAM Customer-Managed Policy Attached to Role by Rare User
AWS IAM Assume Role Policy Update**

Both of these rules relied on `target.entity.id` as a new terms field, this field has been replaced with `entity.target.id` field which is populating the same value for the event.actions these rules trigger on, as shown in the screenshot below.

<img width="1600" height="445" alt="Screenshot 2026-01-15 at 12 13 17 PM" src="https://github.com/user-attachments/assets/27e482fe-2a09-4dfb-8337-2e5070422183" />

## How To Test
- recent test data is in our stack for the 2 rules that have changes to their new terms values.
- test scripts for each:
  - [trigger_privilege_escalation_iam_customer_managed_policy_attached_to_role.py](https://github.com/elastic/elastic-aws-ruleset-testing/blob/main/IAM/trigger_privilege_escalation_iam_customer_managed_policy_attached_to_role.py)
  - [trigger_privilege_escalation_update_assume_role_policy.py](https://github.com/elastic/elastic-aws-ruleset-testing/blob/main/IAM/trigger_privilege_escalation_update_assume_role_policy.py)
2026-01-22 15:01:49 -05:00
Samirbous 5c5185d227 [New] Potential SAP NetWeaver Exploitation rules (#4666)
* [New] Potential SAP NetWeaver Exploitation

https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/

* ++

* Update execution_sap_netweaver_jsp_webshell.toml

* Update execution_sap_netweaver_webshell_exec.toml

* Update rules/cross-platform/execution_sap_netweaver_webshell_exec.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Apply suggestion from @Mikaayenson

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update execution_sap_netweaver_jsp_webshell.toml

* Update execution_sap_netweaver_webshell_exec.toml

* Update execution_sap_netweaver_webshell_exec.toml

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-22 12:58:02 -06:00
Terrance DeJesus dcd7dadece reverting 07579f2bd7 (#5602) 2026-01-22 12:44:18 -06:00
Isai 07579f2bd7 [Rule Tunings] AWS remove target.entity.id and actor.entity.id fields (#5563)
* [Rule Tunings] AWS removal of target.entity.id and actor.entity.id fields

Related Issue : - https://github.com/elastic/security-team/issues/14019

`target.entity.id` and `related.entity.id` fields will soon be fully removed from the AWS Integration. This rule tuning replaces rule queries that relied on `target.entity.id` with the equivalent field `entity.target.id` which was introduced with AWS version 4.7.0 along with several new entity classification fields. This tuning also removes references to these fields in highlighted fields and investigation guides for several rules.

* update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml

update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml

* updated_dates
2026-01-21 13:54:56 -05:00
Isai 5f4f9d206f [Rule Deprecations] AWS Rule Deprecations (#5568)
Completing the Deprecation process for these rules as they have been shipped at least 2 release cycles with "Deprecated - " prefix.

All have the following metadata changes

maturity = "deprecated"
updated_date = "2026/01/16"
deprecation_date = "2026/01/16"
2026-01-20 16:05:39 -05:00
Isai 9e6bf04e82 [Rule Tunings] AWS Removing Disclaimer from IGs (#5567)
- Removing the genAI disclaimer for the AWS ruleset Investigation guides which were all manually modified during the most recent audit.
- Removing any numbering in the investigation guides to maintain better consistency across guides
- Fixed any spacing inconsistencies
2026-01-20 15:52:48 -05:00
Jonhnathan 9055d564f5 [Rule Tuning] Web Server Rules (#5581) 2026-01-20 15:30:57 -03:00
ailiffa e459d8c25a [Rule Tuning] Potential Disabling of AppArmor - Restore AppArmor service filters (#5574) 2026-01-19 09:19:24 -03:00