Terrance DeJesus
7be96ec64d
[Rule Tuning] Add Public Snapshot Coverage Regarding AWS EC2 EBS Snapshot Shared or Made Public ( #4335 )
...
* removing detection gap for EBS snapshots that are made public
* reverted logic; added investigation note about public snapshots
2025-01-20 13:15:41 -05:00
Ruben Groenewoud
cf183579b4
[New Rule] Polkit Version Discovery ( #4378 )
2025-01-20 15:58:27 +01:00
Ruben Groenewoud
2e6ec33141
[New Rule] Polkit Policy Creation ( #4379 )
...
* [New Rule] Polkit Policy Creation
* Update persistence_polkit_policy_creation.toml
2025-01-20 15:47:18 +01:00
Ruben Groenewoud
3e655abfef
[New Rule] Unusual Pkexec Execution ( #4380 )
...
* [New Rule] Unusual Pkexec Execution
* Update execution_unusual_pkexec_execution.toml
2025-01-20 15:35:29 +01:00
Ruben Groenewoud
4294ed8981
[New Rule] NetworkManager Dispatcher Script Creation ( #4381 )
...
* [New Rule] NetworkManager Dispatcher Script Creation
* ++
2025-01-20 15:18:55 +01:00
Ruben Groenewoud
89c113560b
[New Rule] D-Bus Service Created ( #4382 )
2025-01-20 15:07:06 +01:00
Ruben Groenewoud
6cc5184f70
[New Rule] Manual Dracut Execution ( #4383 )
2025-01-20 14:41:44 +01:00
Ruben Groenewoud
abd199a9bc
[New Rule] Dracut Module Creation ( #4384 )
2025-01-20 14:31:16 +01:00
Ruben Groenewoud
2bb46899ae
[New Rule] OpenSSL Password Hash Generation ( #4385 )
...
* [New Rule] OpenSSL Password Hash Generation
* Update rules/linux/persistence_openssl_passwd_hash_generation.toml
2025-01-20 14:14:12 +01:00
Ruben Groenewoud
1fce3fd22a
[New Rule] Boot File Copy ( #4386 )
...
* [New Rule] Boot File Copy
* Update persistence_boot_file_copy.toml
* Update rules/linux/persistence_boot_file_copy.toml
2025-01-20 14:04:02 +01:00
Ruben Groenewoud
b633987e5b
[New Rule] Initramfs Unpacking via unmkinitramfs ( #4387 )
...
* [New Rule] Initramfs Unpacking via unmkinitramfs
* Update rules/linux/persistence_unpack_initramfs_via_unmkinitramfs.toml
2025-01-20 13:43:54 +01:00
Ruben Groenewoud
971049957e
[New Rule] Initramfs Extraction via CPIO ( #4389 )
...
* [New Rule] Initramfs Extraction via CPIO
* Update rules/linux/persistence_extract_initramfs_via_cpio.toml
2025-01-20 13:32:48 +01:00
Samirbous
1dfc84c37d
[Tuning] Powershell Rules ( #4395 )
...
* [Tuning] Powershell Rules
few complementary tuning to add some extra patterns.
* Update defense_evasion_amsi_bypass_powershell.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2025-01-20 12:12:37 +00:00
Ruben Groenewoud
01eda44298
[Rule Tuning] Linux Persistence Rules ( #4393 )
...
* [Rule Tuning] Linux Persistence Rules
* Update persistence_suspicious_file_modifications.toml
* Update rules/linux/persistence_potential_persistence_script_executable_bit_set.toml
2025-01-20 09:51:49 +01:00
Ruben Groenewoud
cf929554a6
[New Rule] Systemd Shell Execution During Boot ( #4392 )
2025-01-20 09:33:46 +01:00
Ruben Groenewoud
f029e9a171
[New Rule] GRUB Configuration Generation through Built-in Utilities ( #4391 )
2025-01-17 18:00:01 +01:00
Ruben Groenewoud
0ef7f3a83e
[New Rule] GRUB Configuration File Creation ( #4390 )
...
* [New Rule] Grub Configuration File Creation
* Update persistence_grub_configuration_creation.toml
2025-01-17 17:49:41 +01:00
Ruben Groenewoud
28c3d074b8
[New Rule] Process Started with Executable Stack ( #4340 )
...
* [New Rule] Process Started with Executable Stack
* [New Rule] Process Started with Executable Stack
* Update execution_executable_stack_execution.toml
* Update rules/linux/execution_executable_stack_execution.toml
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
---------
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
2025-01-17 17:36:39 +01:00
Terrance DeJesus
ca3994af0d
[Deprecation] Deprecating Potential Password Spraying of Microsoft 365 User Accounts ( #4394 )
...
* Deprecating 'Potential Password Spraying of Microsoft 365 User Accounts'
* adding 'Deprecated - Suspicious JAVA Child Process'
* updated dates
* changed to deprecated maturity
2025-01-17 10:52:13 -05:00
Ruben Groenewoud
ac541f0b18
[New Rules] Kernel Seeking/Unpacking Activity ( #4341 )
...
* [New Rules] Kernel Seeking/Unpacking Activity
* ++
2025-01-16 12:04:04 +01:00
Ruben Groenewoud
bba5096efa
[New Rule] System Binary Path File Permission Modification ( #4339 )
2025-01-16 10:32:23 +01:00
Ruben Groenewoud
75c7c09595
[New Rule] Suspicious Path Invocation from Command Line ( #4338 )
2025-01-16 10:20:37 +01:00
Terrance DeJesus
5162067a51
[New Rule] Adding Coverage for Unusual AWS S3 Object Encryption with SSE-C ( #4377 )
...
* new rule 'Unusual AWS S3 Object Encryption with SSE-C'
* updated pyproject patch version
* bump repo version
* Update rules/integrations/aws/impact_s3_unusual_object_encryption_with_sse_c.toml
* updating patch version
* updating patch version
* Adding additional threshold rule
2025-01-15 14:11:58 -05:00
Terrance DeJesus
c04ae6d444
[New Rule] Adding Coverage for SNS Topic Message Publish by Rare User ( #4350 )
...
* new rule 'SNS Topic Message Publish by Rare User'
* added new terms note
* added investigation guide tag
* fixed tag, added investigation fiedls
* toml lint
* fixed mitre ATT&CK mapping
2025-01-15 13:55:45 -05:00
Terrance DeJesus
97b3f43870
[New Rule] Adding Coverage for AWS EC2 Deprecated AMI Discovery ( #4328 )
...
* new rule 'AWS EC2 Deprecated AMI Discovery'
* updated type
* updated non-ecs; bumped package version
* updated query
* added missing index
* updated patch version
2025-01-15 11:53:18 -05:00
Terrance DeJesus
f8312cc5b0
[Rule Tuning] Adjusting Verbiage for AWS EC2 Instance Connect SSH Public Key Uploaded ( #4334 )
...
* tuning rule 'AWS EC2 Instance Connect SSH Public Key Uploaded'
* updating subtechnique ID
* added mitre tag lateral movement
* changing sequence of mitre ATT&CK
2025-01-15 11:12:53 -05:00
Terrance DeJesus
f97007f3a8
[New Rule] Adding Coverage for AWS SQS Queue Purge ( #4354 )
...
* new rule 'AWS SQS Queue Purge'
* Update rules/integrations/aws/defense_evastion_sqs_purge_queue.toml
* added investigation guide tag; fixed file name
2025-01-15 10:52:22 -05:00
Jonhnathan
447fce3b08
[Rule Tuning] Suspicious Communication App Child Process ( #4369 )
2025-01-15 12:13:10 -03:00
Samirbous
bcca0a2016
[New] Sensitive Audit Policy Sub-Category Disabled ( #4373 )
...
* [New] Sensitive Audit Policy Sub-Category Disabled
https://elasticstack.slack.com/archives/C016E72DWDS/p1736784727633579
* Update rules/windows/defense_evasion_audit_policy_disabled_winlog.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/defense_evasion_audit_policy_disabled_winlog.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/defense_evasion_audit_policy_disabled_winlog.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2025-01-14 12:13:45 -03:00
Ruben Groenewoud
79b26085f5
[New Rule] Potential Process Name Stomping with Prctl ( #4352 )
...
* [New Rule] Potential Process Name Stomping with Prctl
* Update defense_evasion_prctl_process_name_tampering.toml
2025-01-13 16:35:40 +01:00
James Valente
f52cfb3729
[Rule: Tuning] - Azure blob permission modification tagging - Correct tags ( #4371 )
...
* Remove `Data Source: Elastic Defend` tag
* Update metadata
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2025-01-13 10:40:34 -03:00
Samirbous
65b95a1996
Update discovery_potential_syn_port_scan_detected.toml ( #4366 )
2025-01-10 15:29:29 +00:00
Jonhnathan
6b0b988d79
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 10 ( #4357 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 10
* Remaining ones
2025-01-09 11:54:46 -03:00
Jonhnathan
7eeca006bc
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 8 ( #4355 )
2025-01-09 11:38:26 -03:00
Jonhnathan
e66bca73e0
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 7 ( #4349 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 7
* Update rules/linux/discovery_process_capabilities.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2025-01-09 11:28:21 -03:00
Jonhnathan
cc889e3bf2
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 4 ( #4345 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 4
* Apply suggestions from code review
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2025-01-09 10:59:32 -03:00
Jonhnathan
0fc83fe815
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 3 ( #4343 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 3
* .
* Update rules/linux/command_and_control_ip_forwarding_activity.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2025-01-09 10:35:58 -03:00
Jonhnathan
d6ceb88558
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 6 ( #4348 )
2025-01-09 10:17:57 -03:00
Jonhnathan
f4a022c5d2
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 5 ( #4346 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - X
* Update rules/linux/defense_evasion_directory_creation_in_bin.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
* Update rules/linux/defense_evasion_mount_execution.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2025-01-09 09:44:40 -03:00
Jonhnathan
2af2e1f57b
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 9 ( #4356 )
2025-01-09 08:29:51 -03:00
Jonhnathan
4142868956
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 2 ( #4333 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2025-01-08 15:23:19 -03:00
Jonhnathan
282f613ddf
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 1 ( #4330 )
...
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 1
* min_stack
* Update defense_evasion_doas_configuration_creation_or_rename.toml
---------
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2025-01-08 14:40:43 -03:00
Ruben Groenewoud
d16f56b4e2
[New Rule] SSH via Backdoored System User ( #4336 )
...
* [New Rule] SSH via Backdoored System User
* ++
* Update persistence_ssh_via_backdoored_system_user.toml
* Update persistence_ssh_via_backdoored_system_user.toml
* Update rules/linux/persistence_ssh_via_backdoored_system_user.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* Update rules/linux/persistence_ssh_via_backdoored_system_user.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
---------
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
2025-01-07 13:20:36 +01:00
Ruben Groenewoud
2530c4d376
[New Rule] Pluggable Authentication Module Source Download ( #4301 )
...
* [New Rule] Pluggable Authentication Module Source Download
* Update persistence_pluggable_authentication_module_source_download.toml
* Update rules/linux/persistence_pluggable_authentication_module_source_download.toml
2025-01-07 13:04:05 +01:00
Samirbous
419e5c1ad3
[Tuning] Suspicious WMI Event Subscription Created ( #4327 )
...
* Update persistence_sysmon_wmi_event_subscription.toml
* Update non-ecs-schema.json
* Update persistence_sysmon_wmi_event_subscription.toml
* Update detection_rules/etc/non-ecs-schema.json
* Update pyproject.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2025-01-06 09:40:26 -03:00
Ruben Groenewoud
feaeabf60c
[New Rule] Dynamic Linker (ld.so) Creation ( #4306 )
2025-01-03 17:06:38 +01:00
Ruben Groenewoud
fea5c90ed9
[New Rule] Kernel Object File Creation ( #4325 )
...
* [New Rule] Kernel Object File Creation
* ++
* Update rules/linux/persistence_kernel_object_file_creation.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2025-01-03 16:49:59 +01:00
Ruben Groenewoud
466097c31e
[Rule Tuning] Potential Persistence via File Modification ( #4310 )
...
* [Rule Tuning] Potential Persistence via File Modification
* Update persistence_suspicious_file_modifications.toml
* Update persistence_suspicious_file_modifications.toml
2025-01-03 16:19:58 +01:00
Ruben Groenewoud
53ca51b20c
[New Rule] Simple HTTP Web Server Connection ( #4309 )
2025-01-03 16:06:28 +01:00
Ruben Groenewoud
e26e4e40b4
[New Rule] Simple HTTP Web Server Creation ( #4308 )
2025-01-03 15:54:25 +01:00