Commit Graph

503 Commits

Author SHA1 Message Date
Ruben Groenewoud 53a2233e9b [New Rule] Node.js Pre or Post-Install Script Execution (#5131)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-09-29 21:48:47 +02:00
Ruben Groenewoud 9f5793759c [New Rule] GitHub Authentication Token Access via Node.js (#5130) 2025-09-24 20:48:19 +02:00
Ruben Groenewoud 53b4e92861 [New Rule] Curl or Wget Spawned via Node.js (#5132)
* [New Rule] Curl or Wget Spawned via Node.js

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml
2025-09-22 10:58:07 +02:00
Mika Ayenson, PhD 392e0253c3 [Rule Tuning] Beats & Endgame Indices (#5072) 2025-09-09 13:19:13 -05:00
Ruben Groenewoud 0f0f16bdee [Rule Tuning] D-Bus Service Created (#5076) 2025-09-09 15:33:58 +02:00
Ruben Groenewoud ef7ff52119 [Rule Tuning] Misc. Linux ES|QL Rules (#5050)
* [Rule Tuning] Misc. Linux ES|QL Rules

* update date bump

* ++

* Update persistence_web_server_sus_child_spawned.toml

* Update working directory conditions in TOML file
2025-09-02 13:49:22 +02:00
shashank-elastic 93ac471574 Monthly Schema Updates (#5046) 2025-09-01 20:42:42 +05:30
Ruben Groenewoud a4a5b171c4 [New Rule] Multi-Base64 Decoding Attempt from Suspicious Location (#4931)
* [New Rule] Multi-Base64 Decoding Attempt from Suspicious Location

* ++

* Update rules/linux/defense_evasion_multi_base64_decoding_attempt.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/linux/defense_evasion_multi_base64_decoding_attempt.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-08-25 10:31:25 +02:00
Terrance DeJesus b28338c680 [Rule Tuning] ESQL Query Field Dynamic Field Standardization (#4912)
* adjusted Potential Widespread Malware Infection Across Multiple Hosts

* adjusted Microsoft Azure or Mail Sign-in from a Suspicious Source

* adjusted AWS EC2 Multi-Region DescribeInstances API Calls

* adjusted AWS Discovery API Calls via CLI from a Single Resource

* adjusted AWS Service Quotas Multi-Region  Requests

* adjusted AWS EC2 EBS Snapshot Shared or Made Public

* adjusted AWS S3 Bucket Enumeration or Brute Force

* adjusted AWS EC2 EBS Snapshot Access Removed

* adjusted Potential AWS S3 Bucket Ransomware Note Uploaded

* adjusted AWS S3 Object Encryption Using External KMS Key

* adjusted AWS S3 Static Site JavaScript File Uploaded

* adjusted AWS Access Token Used from Multiple Addresses

* adjusted AWS Signin Single Factor Console Login with Federated User

* adjusted AWS IAM AdministratorAccess Policy Attached to Group

* adjusted AWS IAM AdministratorAccess Policy Attached to Role

* adjusted AWS IAM AdministratorAccess Policy Attached to User

* adjusted AWS Bedrock Invocations without Guardrails Detected by a Single User Over a Session

* adjusted AWS Bedrock Guardrails Detected Multiple Violations by a Single User Over a Session

* adjusted AWS Bedrock Guardrails Detected Multiple Policy Violations Within a Single Blocked Request

* adjusted Unusual High Confidence Content Filter Blocks Detected

* adjusted Potential Abuse of Resources by High Token Count and Large Response Sizes

* AWS Bedrock Detected Multiple Attempts to use Denied Models by a Single User

* Unusual High Denied Sensitive Information Policy Blocks Detected

* adjusted Unusual High Denied Topic Blocks Detected

* adjusted AWS Bedrock Detected Multiple Validation Exception Errors by a Single User

* adjusted Unusual High Word Policy Blocks Detected

* adjusted Microsoft Entra ID Concurrent Sign-Ins with Suspicious Properties

* adjusted Azure Entra MFA TOTP Brute Force Attempts

* adjusted Microsoft Entra ID Sign-In Brute Force Activity

* adjusted Microsoft Entra ID Exccessive Account Lockouts Detected

* adjusted Microsoft 365 Brute Force via Entra ID Sign-Ins

* deprecated Azure Entra Sign-in Brute Force Microsoft 365 Accounts by Repeat Source

* adjusted Microsoft Entra ID Session Reuse with Suspicious Graph Access

* adjusted Suspicious Microsoft OAuth Flow via Auth Broker to DRS

* adjusted Potential Denial of Azure OpenAI ML Service

* adjusted Azure OpenAI Insecure Output Handling

* adjusted Potential Azure OpenAI Model Theft

* adjusted M365 OneDrive Excessive File Downloads with OAuth Token

* adjusted Multiple Microsoft 365 User Account Lockouts in Short Time Window

* adjusted Potential Microsoft 365 User Account Brute Force

* adjusted Suspicious Microsoft 365 UserLoggedIn via OAuth Code

* adjusted Multiple Device Token Hashes for Single Okta Session

* adjusted Multiple Okta User Authentication Events with Client Address

* adjusted Multiple Okta User Authentication Events with Same Device Token Hash

* adjusted High Number of Okta Device Token Cookies Generated for Authentication

* adjusted Okta User Sessions Started from Different Geolocations

* adjusted High Number of Egress Network Connections from Unusual Executable

* adjusted Unusual Base64 Encoding/Decoding Activity

* adjusted Potential Port Scanning Activity from Compromised Host

* adjusted Potential Subnet Scanning Activity from Compromised Host

* adjusted Unusual File Transfer Utility Launched

* adjusted Potential Malware-Driven SSH Brute Force Attempt

* adjusted Unusual Process Spawned from Web Server Parent

* adjusted Unusual Command Execution from Web Server Parent

* adjusted  Rare Connection to WebDAV Target

* adjusted Potential PowerShell Obfuscation via Invalid Escape Sequences

* adjusted Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion

* adjusted Unusual File Creation by Web Server

* adjusted Potential PowerShell Obfuscation via High Special Character Proportion

* adjusted Potential Malicious PowerShell Based on Alert Correlation

* adjusted Potential PowerShell Obfuscation via Character Array Reconstruction

* adjusted Potential PowerShell Obfuscation via String Reordering

* adjusted Potential PowerShell Obfuscation via String Concatenation

* adjusted Potential PowerShell Obfuscation via Reverse Keywords

* adjusted PowerShell Obfuscation via Negative Index String Reversal

* adjusted Dynamic IEX Reconstruction via Method String Access

* adjusted Potential Dynamic IEX Reconstruction via Environment Variables

* adjusted Potential PowerShell Obfuscation via High Numeric Character Proportion

* adjusted Potential PowerShell Obfuscation via Concatenated Dynamic Command Invocation

* adjusted Rare Connection to WebDAV Target

* adjusted Potential PowerShell Obfuscation via Invalid Escape Sequences

* adjusted Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion

* adjusted Potential PowerShell Obfuscation via Character Array Reconstruction

* adjusted Potential PowerShell Obfuscation via High Special Character Proportion

* adjusted Potential PowerShell Obfuscation via Special Character Overuse

* adjusted Potential PowerShell Obfuscation via String Reordering

* adjusted Suspicious Microsoft 365 UserLoggedIn via OAuth Code

* adjusted fields that were inconsistent

* adjusted additional fields

* adjusted esql to Esql

* adjusted several rules for common field names

* updating rules

* updated dates

* updated dates

* updated ESQL fields

* lowercase all functions and logical operators

* adjusted dates for unit tests

* Update Esql_priv to Esql_temp as these don't hold PII

* PowerShell adjustments

* Make query comments consistent

* update comment

* reverted 2856446a-34e6-435b-9fb5-f8f040bfa7ed

* Update rules/windows/discovery_command_system_account.toml

* removed dot notation

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-08-05 19:35:41 -04:00
shashank-elastic 2a73a572fb Investigation guides Update (#4920) 2025-07-22 07:52:48 +05:30
Ruben Groenewoud 5c901841a3 [New Rule] Potential Impersonation Attempt via Kubectl (#4833)
* [New Rule] Potential Impersonation Attempt via Kubectl

* ++

* Update defense_evasion_potential_kubectl_impersonation.toml
2025-07-21 10:03:03 +02:00
Ruben Groenewoud d510a965e9 [New Rule] Unusual Kill Signal (#4911)
* [New Rule] Unusual Kill Signal

* Update defense_evasion_unsual_kill_signal.toml

* Update defense_evasion_unsual_kill_signal.toml
2025-07-17 15:05:28 +02:00
shashank-elastic b70792082a Fix pipe characters in rule descriptions (#4893) 2025-07-10 15:11:20 +05:30
shashank-elastic 7175b3ab06 Add investigation guides for detection rules (#4886) 2025-07-08 00:25:42 +05:30
shashank-elastic 9b292b97ea Prep 8.19/9.1 (#4869)
* Prep 8.19/9.1 Release

* Download Beats Schema

* Download API Schema

* Download 8.18.3 Beats Schema

* Download Latest Integrations manifest and schema

* Comment old schemas

* Update Patch version
2025-07-07 11:27:48 -04:00
Ruben Groenewoud 715e3f44f4 [New Rule] Kubectl Apply Pod from URL (#4855)
* [New Rule] Kubectl Apply Pod from URL

* Update execution_kubectl_apply_pod_from_url.toml
2025-07-03 10:47:07 +02:00
Ruben Groenewoud 26e35fd03b [Rule Tuning] Potential Linux Tunneling and/or Port Forwarding (#4858) 2025-07-03 09:50:30 +02:00
Ruben Groenewoud 3efcd70f8c [New Rule] Kubernetes Sensitive Configuration File Activity (#4849)
* [New Rule] Kubernetes Sensitive Configuration File Activity

* Update rules/linux/persistence_kubernetes_sensitive_file_activity.toml
2025-07-02 17:16:25 +02:00
Ruben Groenewoud 0847c32333 [New Rule] Potential Kubectl Masquerading (#4832)
* [New Rule] Potential Kubectl Masquerading

* Update defense_evasion_potential_kubectl_masquerading.toml

* ++

* ++

* Update defense_evasion_potential_kubectl_masquerading.toml

* Update rules/linux/defense_evasion_potential_kubectl_masquerading.toml
2025-06-30 13:47:58 +02:00
Ruben Groenewoud bc87ca1d5b [New Rule] Kubectl Network Configuration Modification (#4836)
* [New Rule] Kubectl Network Configuration Modification

* ++
2025-06-30 10:53:32 +02:00
Ruben Groenewoud 786542a9d4 [New Rule] Kubernetes Direct API Request via Curl or Wget (#4841) 2025-06-30 10:34:10 +02:00
Ruben Groenewoud 7c07033354 [Deprecation] Suspicious File Creation in /etc for Persistence (#4850)
* [Deprecation] Suspicious File Creation in /etc for Persistence

* [Deprecation] Suspicious File Creation in /etc for Persistence

* Update persistence_etc_file_creation.toml

* Fix
2025-06-27 10:14:53 +02:00
Ruben Groenewoud e666cabb3d [Rule Tuning] Added Kubernetes Data Source Tag (#4831) 2025-06-24 13:18:58 +02:00
Ruben Groenewoud dd4576d127 [New Rule] Kubernetes Service Account Secret Access (#4816) 2025-06-18 09:31:35 +05:30
Ruben Groenewoud 386a4b85eb [New Rule] Kubeconfig File Creation or Modification (#4810)
* [New Rule] Kubeconfig File Creation or Modification

* Update lateral_movement_kubeconfig_file_activity.toml
2025-06-17 15:01:07 +02:00
Ruben Groenewoud 6bc808916b [New Rule] Kubeconfig File Discovery (#4811)
* [New Rule] Kubeconfig File Discovery

* Update discovery_kubeconfig_file_discovery.toml
2025-06-17 14:42:39 +02:00
Ruben Groenewoud 103fbf12c8 [Rule Tuning] Container Management Utility Run Inside A Container (#4809)
* [Rule Tuning] Container Management Utility Run Inside A Container

* ++
2025-06-17 14:30:34 +02:00
Ruben Groenewoud dfd46a09e8 [New Rule] Kubectl Permission Discovery (#4812) 2025-06-17 14:14:35 +02:00
Ruben Groenewoud b2887e592b [Rule Tuning] Loadable Kernel Module Configuration File Creation (#4765) 2025-06-05 13:12:24 +02:00
Ruben Groenewoud ba9f76c6b5 [Rule Tuning] Shell Configuration Creation or Modification (#4766) 2025-06-04 11:26:45 +02:00
Ruben Groenewoud 3a601a10fb [New Rule] Unusual Exim4 Child Process (#4684) 2025-05-06 22:24:34 +05:30
Ruben Groenewoud c145e33f16 [New Rule] Unusual Execution from Kernel Thread (kthreadd) Parent (#4683) 2025-05-06 22:08:43 +05:30
Ruben Groenewoud 608e02e27e [New Rule] Linux Telegram API Request (#4677) 2025-05-06 21:53:19 +05:30
Ruben Groenewoud 944428d81e [New Rule] Unusual LD_PRELOAD/LD_LIBRARY_PATH Command Line Arguments (#4685) 2025-05-06 21:21:58 +05:30
Ruben Groenewoud fdc6b09d54 [New Rule] System Binary Symlink to Suspicious Location (#4682) 2025-05-06 17:46:47 +05:30
Ruben Groenewoud 25dc8498ae [New Rule] Suspicious Named Pipe Creation (#4681) 2025-05-06 17:30:38 +05:30
Ruben Groenewoud 8b08795e00 [New Rule] Suspicious Kernel Feature Activity (#4676) 2025-05-06 17:13:24 +05:30
Ruben Groenewoud 0193af2842 [New Rule] Potential Data Exfiltration Through Curl (#4678) 2025-05-06 16:57:59 +05:30
Ruben Groenewoud 4030de9295 [New/Tuning] Potential Hex Payload Execution via Command-Line (#4675) 2025-05-06 16:29:03 +05:30
Ruben Groenewoud eb3520a63b [New Rule] Potential Backdoor Execution Through PAM_EXEC (#4674) 2025-05-06 16:13:23 +05:30
Ruben Groenewoud 403e20c2c6 [New Rule] Git Repository or File Download to Suspicious Directory (#4663) 2025-05-06 15:05:27 +05:30
Ruben Groenewoud 3f9e2edcb5 [New Rule] Manual Mount Discovery via /etc/exports (#4662) 2025-05-06 14:48:55 +05:30
Ruben Groenewoud a9e8a78c09 [New Rule] Docker Release File Creation (#4661) 2025-05-06 14:31:52 +05:30
Ruben Groenewoud 13cf424ef5 [New Rule] Manual Memory Dumping via Proc Filesystem (#4660) 2025-05-06 14:16:15 +05:30
Ruben Groenewoud c9c41747fc [FN Tuning] Suspicious /proc/maps Discovery (#4659) 2025-05-06 13:59:44 +05:30
Ruben Groenewoud 1150271372 [New Rule] Suspicious Path Mounted (#4664) 2025-05-06 13:43:00 +05:30
shashank-elastic e4856d3c2c Refresh ecs, beats, integration manifests & schemas (#4699) 2025-05-05 23:06:40 +05:30
Ruben Groenewoud 18e1103c51 [New Rule] Potential Linux Tunneling and/or Port Forwarding via SSH Option (#4658) 2025-05-05 09:59:08 +02:00
Jonhnathan 3eed0f5b6a [Rule Tuning] SSH Authorized Keys File Deletion (#4591)
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-04-15 12:16:03 -03:00
Ruben Groenewoud 3b1f780435 [D4C Conversion] Converting Compatible D4C Rules to DR (#4532)
* [D4C Conversion] Converting Compatible D4C Rules to DR

* added host.os.type

* Rename

* Update rules/linux/execution_container_management_binary_launched_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/linux/privilege_escalation_debugfs_launched_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/linux/privilege_escalation_debugfs_launched_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/linux/privilege_escalation_mount_launched_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/linux/privilege_escalation_mount_launched_inside_container.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-04-10 14:26:40 +02:00