Commit Graph

2800 Commits

Author SHA1 Message Date
github-actions[bot] 5832aec32b Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4731) 2025-05-20 07:44:22 +05:30
Terrance DeJesus 82bee3e9c2 [Rule Tuning] Microsoft Graph First Occurrence of Client Request (#4728)
* tuning 'Microsoft Graph First Occurrence of Client Request'

* updated update date
2025-05-19 14:56:21 -04:00
Terrance DeJesus fcd70b284b [New Rule] Multiple Microsoft 365 User Account Lockouts in Short Time Window (#4717)
* new rule 'Multiple Microsoft 365 User Account Lockouts in Short Time Window'

* adjusted logic

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-19 14:44:46 -04:00
Terrance DeJesus 3e0a9ec47b [Rule Tuning] Potential Microsoft 365 User Account Brute Force (#4716)
* tuning M365 brute force rule

* updated logic

* updated references

* adds minstack for values

* removed ignoring MSFT ASN

* Update rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-19 14:08:38 -04:00
Terrance DeJesus 0d366d6a15 [New Rule] Microsoft Entra ID Protection - Risk Detections (#4725)
* new rule 'Microsoft Entra ID Protection - Risk Detections'

* added timing bypass

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-05-19 13:51:26 -04:00
shashank-elastic 43cdc7ff51 Refresh MITRE version (#4729) 2025-05-19 22:49:33 +05:30
Jonhnathan e6fb73970d [Rule Tuning] Startup or Run Key Registry Modification (#4710) 2025-05-19 22:12:37 +05:30
Jonhnathan 9af2bf4a66 [Rule Tuning] Unusual Scheduled Task Update (#4714) 2025-05-19 21:51:14 +05:30
Emmanuel Ferdman 2ad2d68c4a Resolve datetime.utcfromtimestamp deprecation (#4719) 2025-05-19 21:35:07 +05:30
Samirbous f2f9cdac66 Update initial_access_azure_o365_with_network_alert.toml (#4723)
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-05-19 20:54:19 +05:30
Jonhnathan 47059e22f2 [Rule Tuning] Backup Deletion with Wbadmin (#4715) 2025-05-19 20:34:25 +05:30
Terrance DeJesus 909ff9c07e new hunt 'Microsoft Entra Infrequent Suspicious OData Client Requests' (#4708)
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-09 22:14:42 -04:00
Terrance DeJesus 8f27c24528 [New Rule] Suspicious Email Access by First-Party Application via Microsoft Graph (#4704)
* new rule 'Suspicious Email Access by First-Party Application via Microsoft Graph'

* updated patch version

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2025-05-09 20:49:08 -04:00
Terrance DeJesus d83e1c711a [New Rule] Microsoft Entra Session Reuse with Suspicious Graph Access (#4711)
* new rule 'Microsoft Entra Session Reuse with Suspicious Graph Access'

* fixed tags; linted

* fixed mitre mappings

* updated name and investigation guide
2025-05-09 20:32:22 -04:00
Jonhnathan d30e65e5a2 [Rule Tuning] Unusual File Creation - Alternate Data Stream (#4712) 2025-05-09 13:56:54 -03:00
Terrance DeJesus 762857f15f [Rule Tuning] Tuning Suspicious Mailbox Permission Delegation in Exchange Online (#4705)
* rule tuning 'Suspicious Mailbox Permission Delegation in Exchange Online'

* Update rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml

* updated date
2025-05-08 11:01:00 -04:00
shashank-elastic 0f3bfcd98a Fix new term doc broken link (#4706) 2025-05-07 17:03:58 +05:30
github-actions[bot] acab8b4c6e Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4703) 2025-05-07 07:34:20 +05:30
github-actions[bot] 69498a97ac Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4702) 2025-05-06 23:12:56 +05:30
Eric Forte 639d748ec2 [FR] Add check-version-lock dev command (#4650)
* Add check-version-lock dev command

* Bump the version

* Add Check Double Bumps to lock-versions workflow

* Replace return with ctx aware exit

* Bump Version

* Update Double Bump Modulo calculation

* Update if formatting

* Undo formatting typo

* Add logic to process the local file

* Update for descriptiveness

* Allow double bump branch for testing

* Pass github token

* Re-restrict to main

* Patch version bump

* Add comment if no double bumps found

* Bump Version
2025-05-06 13:26:23 -04:00
James Valente 36d595ae2f [Rule Tuning] Add exceptions for non-interactive signin failures for Entra M365 Bruteforce (#4405)
* Add exceptions for non-interactive signin failures.

Include exceptions for error codes, restricted to `NonInteractiveUserSignInLogs` and token refreshes:

- 70043 : Refresh token expired or no longer valid due to conditional access frequency checks
- 70044 : Session expired or no longer valid due to conditional access frequency checks
- 50057 : User account is disabled

* Update rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml

* Update metadata for `updated_date`

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-05-06 22:43:15 +05:30
Ruben Groenewoud 3a601a10fb [New Rule] Unusual Exim4 Child Process (#4684) 2025-05-06 22:24:34 +05:30
Ruben Groenewoud c145e33f16 [New Rule] Unusual Execution from Kernel Thread (kthreadd) Parent (#4683) 2025-05-06 22:08:43 +05:30
Ruben Groenewoud 608e02e27e [New Rule] Linux Telegram API Request (#4677) 2025-05-06 21:53:19 +05:30
Jonhnathan d3aa4b2f38 [Rule Tuning] Reduce Severity from Critical to High (#4637) 2025-05-06 21:37:47 +05:30
Ruben Groenewoud 944428d81e [New Rule] Unusual LD_PRELOAD/LD_LIBRARY_PATH Command Line Arguments (#4685) 2025-05-06 21:21:58 +05:30
Jonhnathan e028bf7954 [New Rule] Potential Dynamic IEX Reconstruction via Environment Variables (#4633) 2025-05-06 21:06:06 +05:30
Terrance DeJesus a34a26ddec [Rule Tuning] Excluding Microsoft Entra ID Service Principal Addition Invoked by MSFT Identity (#4700)
* tuning rule to exclude service principals added by MSFT

* added additional exclusions

* updated rule name and file name

* updated investigation guide and mitre
2025-05-06 11:19:50 -04:00
Jonhnathan 0cd7de6862 [New Rule] Potential PowerShell Obfuscation via Special Character Overuse (#4632) 2025-05-06 20:29:19 +05:30
Jonhnathan b7016253ae [New Rule] Potential PowerShell Obfuscation via High Numeric Character Proportion (#4631) 2025-05-06 20:13:34 +05:30
Jonhnathan 5d8f0c2ffe [New Rule] Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion (#4630) 2025-05-06 19:58:01 +05:30
Jonhnathan b6a755c84f [New Rule][BBR] Potential PowerShell Obfuscation via High Special Character Proportion (#4629) 2025-05-06 19:41:33 +05:30
Jonhnathan dc6cb3e811 [New Rule] Potential PowerShell Obfuscation via Concatenated Dynamic Command Invocation (#4615) 2025-05-06 19:26:15 +05:30
Jonhnathan 5ab73943a1 [New Rule] Potential PowerShell Obfuscation via Invalid Escape Sequences (#4614) 2025-05-06 19:10:10 +05:30
Jonhnathan b5ac9707ba [New Rule] PowerShell Obfuscation via Negative Index String Reversal (#4610) 2025-05-06 18:54:22 +05:30
Jonhnathan c291638521 [New Rule] Potential PowerShell Obfuscation via Reverse Keywords (#4609) 2025-05-06 18:36:13 +05:30
Jonhnathan 7b9cd77bc2 [New Rule] Potential PowerShell Obfuscation via Character Array Reconstruction (#4608) 2025-05-06 18:18:29 +05:30
Jonhnathan ebe77f2d86 [New Rule] Potential PowerShell Obfuscation via String Concatenation (#4607) 2025-05-06 18:02:35 +05:30
Ruben Groenewoud fdc6b09d54 [New Rule] System Binary Symlink to Suspicious Location (#4682) 2025-05-06 17:46:47 +05:30
Ruben Groenewoud 25dc8498ae [New Rule] Suspicious Named Pipe Creation (#4681) 2025-05-06 17:30:38 +05:30
Ruben Groenewoud 8b08795e00 [New Rule] Suspicious Kernel Feature Activity (#4676) 2025-05-06 17:13:24 +05:30
Ruben Groenewoud 0193af2842 [New Rule] Potential Data Exfiltration Through Curl (#4678) 2025-05-06 16:57:59 +05:30
Ruben Groenewoud 4030de9295 [New/Tuning] Potential Hex Payload Execution via Command-Line (#4675) 2025-05-06 16:29:03 +05:30
Ruben Groenewoud eb3520a63b [New Rule] Potential Backdoor Execution Through PAM_EXEC (#4674) 2025-05-06 16:13:23 +05:30
Samirbous 91acb4e9ce [New] Windows Sandbox with Sensitive Configuration (#4606)
https://blog-en.itochuci.co.jp/entry/2025/03/12/140000
2025-05-06 15:58:39 +05:30
Samirbous 04f15aa08c [New] Rare Connection to WebDAV Target (#4667) 2025-05-06 15:41:30 +05:30
Samirbous 70f758d9ad [New] Microsoft Azure or Mail Sign-in from a Suspicious Source (#4673) 2025-05-06 15:21:11 +05:30
Ruben Groenewoud 403e20c2c6 [New Rule] Git Repository or File Download to Suspicious Directory (#4663) 2025-05-06 15:05:27 +05:30
Ruben Groenewoud 3f9e2edcb5 [New Rule] Manual Mount Discovery via /etc/exports (#4662) 2025-05-06 14:48:55 +05:30
Ruben Groenewoud a9e8a78c09 [New Rule] Docker Release File Creation (#4661) 2025-05-06 14:31:52 +05:30