Commit Graph

3601 Commits

Author SHA1 Message Date
Isai 84f2d3771c [Rule Tunings] AWS ESQL keep fields missing (#6014)
* [Tunings] AWS ESQL keep fields missing

Adding missing keep fields to 2 ESQL rules. 1 additional field name change as well.

* Apply suggestions from @eric

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-05-01 15:43:38 -04:00
Jonhnathan 771be70c38 [Rule Tuning] Windows High-Severity Rules Revamp - 6 (#6010)
* [Rule Tuning] Windows High-Severity Rules Revamp - 6

* ++
2026-05-01 16:14:44 -03:00
Jonhnathan 2cb5e1860a [Rule Tuning] Windows High-Severity Rules Revamp - 8 (#6019)
* [Rule Tuning] Windows High-Severity Rules Revamp - 8

* Delete measure_note_size.py
2026-05-01 15:52:50 -03:00
Jonhnathan 8982ff9032 [Rule Tuning] Windows High-Severity Rules Revamp - 9 (#6022) 2026-05-01 15:32:43 -03:00
Jonhnathan 920910c485 [Rule Tuning] Windows High-Severity Rules Revamp - 4 (#5981)
* [Rule Tuning] Windows High-Severity Rules Revamp - 4

* Apply suggestion from @w0rk3r
2026-05-01 14:31:25 -03:00
Samirbous 244cdda427 [New] Multi-Cloud CLI Token and Credential Access Commands (#6012)
* [New] Multi-Cloud CLI Token and Credential Access Commands

Correlates process telemetry for shells and major cloud/Kubernetes CLIs when command lines match token or credential material access patterns (GCP, Azure, AWS, GitHub, kubectl, DigitalOcean, OCI). Flags hosts where multiple cloud targets appear occurs within five-minute window.

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Apply suggestion from @eric-forte-elastic

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Update credential_access_multi_cloud_cli_token_harvesting.toml

* Update credential_access_multi_cloud_cli_token_harvesting.toml

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-05-01 17:35:19 +01:00
Samirbous ba8fa3ef0f [Tuning/New] Namespace Manipulation Using Unshare (#6024)
* Update privilege_escalation_unshare_namespace_manipulation.toml

* Create privilege_escalation_unshare_namespace_manip.toml

* Apply suggestion from @Aegrah

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update privilege_escalation_unshare_namespace_manip.toml

* Update privilege_escalation_unshare_namespace_manipulation.toml

* Update privilege_escalation_unshare_namespace_manipulation.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-05-01 15:29:44 +01:00
Mika Ayenson, PhD a1458f0fd0 Revert "[Tuning] Namespace Manipulation Using Unshare (#5989)" (#6023)
This reverts commit 175e043adf.
2026-05-01 08:23:55 -05:00
Samirbous b399d856a1 [New] AWS Lateral Movement via Kubernetes SA (#5959)
* [New] AWS Lateral Movement from Kubernetes SA via AssumeRoleWithWebIdentity

Detects when credentials issued through `AssumeRoleWithWebIdentity` for a Kubernetes service account identity are later used for several distinct AWS control-plane actions on the same session access key. Workloads that use EKS IAM Roles for Service Accounts routinely exchange a projected service-account token for short-lived IAM credentials; this rule highlights sessions where that exchange is followed by a spread of sensitive APIs—reconnaissance, secrets and parameter
access, IAM changes, or compute creation—beyond what routine pod traffic usually shows.

* Update initial_access_assumed_web_identity_session_with_multi_phase_api_use.toml

* Update and rename initial_access_assumed_web_identity_session_with_multi_phase_api_use.toml to lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml

* Create initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

* Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

* Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

* Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

* [New] Potential Privilege Escalation in Container via Runc Init

Identifies audit events for `runc init` child processes where the effective user is root and the login user ID is not root. This pattern can indicate privilege escalation or credential separation abuse inside container runtimes, where a process executes  with elevated effective privileges while retaining a non-root audit identity.

* Update rules/linux/privilege_escalation_container_runc_init_effective_root_auditd.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Delete rules/linux/privilege_escalation_container_runc_init_effective_root_auditd.toml

* Update rules/integrations/aws/initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Apply suggestion from @imays11

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/integrations/aws/lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/integrations/aws/lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules/integrations/aws/initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Apply suggestion from @terrancedejesus

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Apply suggestion from @terrancedejesus

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2026-05-01 12:10:55 +01:00
Samirbous 175e043adf [Tuning] Namespace Manipulation Using Unshare (#5989)
* Update privilege_escalation_unshare_namespace_manipulation.toml

* Update privilege_escalation_unshare_namespace_manipulation.toml
2026-05-01 11:17:17 +01:00
Samirbous 6b3b84ca38 [New/Tuning] Linux LPE via SUID Shell (#5980)
* [New] Kubernetes Pod Exec with Curl or Wget to HTTPS

Detects pod or attach `exec` API calls where the decoded request query implies curl or wget fetching an https URL (avoid noisy local http services).

* Create execution_kubernetes_pod_exec_potential_reverse_shell.toml

* Update execution_kubernetes_pod_exec_curl_wget_https.toml

* Update execution_kubernetes_pod_exec_potential_reverse_shell.toml

* ++

* ++

* Add auditd rule for root-effective shell -p outside system paths; extend SUID/SGID exploitation coverage.

Made-with: Cursor

* Revert "++"

This reverts commit eb5631d80e980a3ad59f44095741505f5c4fc7ec.

* Revert "++"

This reverts commit 2d2c34ca211879069f666f850cb00a4e18b24f27.

* Delete rules/integrations/kubernetes/execution_kubernetes_pod_exec_curl_wget_https.toml

* Delete rules/integrations/kubernetes/execution_kubernetes_pod_exec_potential_reverse_shell.toml

* Update privilege_escalation_auditd_euid_root_shell_from_non_standard_path.toml

* Update privilege_escalation_auditd_euid_root_shell_from_non_standard_path.toml

* Update rules/linux/privilege_escalation_auditd_euid_root_shell_from_non_standard_path.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update privilege_escalation_auditd_euid_root_shell_from_non_standard_path.toml

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-05-01 10:51:29 +01:00
Ruben Groenewoud 8dc3fef270 [Rule Tuning] Privilege Escalation via SUID/SGID (#6017)
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-05-01 10:08:46 +02:00
Jonhnathan eb32e7a242 [Rule Tuning] Veeam Backup Library Loaded by Unusual Process (#5985) 2026-04-30 18:15:40 -03:00
Samirbous f0467c8bed [New] Suspicious SUID Binary Execution (#6018)
* [New] Suspicious SUDI Binary Execution

Detects execution of common privilege elevation helpers (su, sudo, pkexec, passwd, chsh, newgrp) under the root effective user when the real user and parent user are not root, combined with minimal argument counts and suspicious parent context (interpreters, short shell -c invocations, or parents running from user-writable paths) :

* Update rules/linux/privilege_escalation_suspicious_sudi_binary_execution.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/linux/privilege_escalation_suspicious_sudi_binary_execution.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update privilege_escalation_suspicious_sudi_binary_execution.toml

* Update privilege_escalation_suspicious_sudi_binary_execution.toml

* Rename privilege_escalation_suspicious_sudi_binary_execution.toml to privilege_escalation_suspicious_suid_binary_execution.toml

* Update privilege_escalation_suspicious_suid_binary_execution.toml

* Update privilege_escalation_suspicious_suid_binary_execution.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-04-30 17:38:22 +01:00
Eric Forte 3371938045 [New] Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket (#6015)
* initial draft rule too noisy atm

* Switch To Sequence Rule
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-04-30 12:24:01 -04:00
Jonhnathan b9065e0689 [Rule Tuning] Add Lunixar to RMM rules, fix new_terms condition (#5986) 2026-04-30 07:59:46 -03:00
Eric Forte f7387bb10d [FR] [DAC] Add Exception Duplication Checking (#5689)
* Add Exception Duplication Checking
2026-04-29 08:57:07 -04:00
github-actions[bot] cb3c342b31 Lock versions for releases: 8.19,9.2,9.3,9.4 (#5998) 2026-04-29 00:52:04 +05:30
Terrance DeJesus 53f26965e3 [Rule Tuning] Revert Event Dataset for Security Alert Index (#5994)
* [Rule Tuning] Revert Event Dataset for Security Alert Index; Add Unit Test

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
2026-04-28 13:17:03 -04:00
wingiti 0f521a0848 Fix value lists within exception lists (#5963)
* Fix value lists within exception lists
2026-04-24 12:23:06 -04:00
Eric Forte ff369b4e44 [Bug] Lock Pyright Version (#5977) 2026-04-23 09:22:10 -04:00
Mika Ayenson, PhD b6886f310c [FR] Add enforcement for deprecated_reason (#5953) 2026-04-23 17:15:47 +05:30
github-actions[bot] 2dac152094 Lock versions for releases: 8.19,9.2,9.3,9.4 (#5972)
* Locked versions for releases: 8.19,9.2,9.3,9.4

---------

Co-authored-by: shashank-elastic <shashank-elastic@users.noreply.github.com>
2026-04-22 20:15:10 -04:00
Eric Forte 2029654e79 ESQL validation support fix (#5970) 2026-04-22 16:52:37 -04:00
shashank-elastic 7a54f8be99 Prep for Release 9.4 (#5965) 2026-04-23 00:13:05 +05:30
Jonhnathan ebcd05f879 [Rule Tuning] Misc Windows Tunings (#5955)
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2026-04-22 15:10:05 -03:00
Mika Ayenson, PhD b805dbed76 [Rule Tuning] GenAI or MCP Server Child Process Execution (#5951) 2026-04-22 23:26:25 +05:30
Samirbous 496d2e206a [New] AWS Credentials Used from GitHub Actions and Non-CI/CD Infra (#5956)
* [New] AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure

Detects AWS access keys that are used from both GitHub Actions CI/CD infrastructure and non-CI/CD infrastructure. This pattern indicates potential credential theft where an attacker who has stolen AWS credentials configured as GitHub Actions secrets and is using them from their own infrastructure.

* Update initial_access_github_actions_oidc_credentials_used_from_suspicious_network.toml

* ++

* Update initial_access_github_actions_oidc_credentials_used_from_suspicious_network.toml

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2026-04-22 23:15:55 +05:30
Samirbous 2177135f86 [New] AWS Rare Source AS Organization Activity (#5957)
* [New] AWS Rare Source AS Organization Activity

Surfaces an AWS identity whose successful API traffic is dominated by a small set of large cloud-provider source AS organization labels, yet also shows a very small share of traffic from other AS organization names—including at least one sensitive control-plane, credential, storage, or model-invocation action on that uncommon network path with recent
activity from the uncommon path. The intent is to highlight disproportionate “baseline” cloud egress versus sparse use from rarer networks on the same principal, a shape that can appear when automation or CI credentials are reused or pivoted outside their usual hosted-cloud footprint.

* Apply suggestion from @eric-forte-elastic

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update initial_access_aws_api_unusual_asn.toml

* Update initial_access_aws_api_unusual_asn.toml

* Update initial_access_aws_api_unusual_asn.toml

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2026-04-22 23:00:57 +05:30
Samirbous 62076dd0dd [Tuning] Execution via GitHub Actions Runner (#5892) 2026-04-22 22:46:22 +05:30
Samirbous ec791fa67a [New] Long Base64 Encoded Command via Scripting Interpreter (#5891)
* [New] Long Base64 Encoded Command via Scripting Interpreter

Identifies oversized command lines used by Python, PowerShell, Node.js, or Deno that contain base64 decoding or encoded-command patterns. Adversaries may embed long inline encoded payloads in scripting interpreters to evade inspection and execute malicious content across Windows, macOS, and Linux systems.

* Update defense_evasion_long_base64_encoded_interpreter_command_line.toml

* Update defense_evasion_long_base64_encoded_interpreter_command_line.toml
2026-04-22 18:05:49 +01:00
Mika Ayenson, PhD be80d7f2be [Rule Tuning] Additional GenAI context for Domains & Cred File Access (#5958) 2026-04-22 11:34:10 -05:00
Mika Ayenson, PhD 876e4ed535 [Bug ]Fix Kibana version parsing for package version (#5962)
* [Bug ]Fix kibana version parsing for package version

---------

Co-authored-by: Shashank K S <Shashank.Suryanarayana@elastic.co>
2026-04-22 11:25:06 -04:00
Terrance DeJesus aa89d2512f [Rule Tuning] Multiple Device Token Hashes for Single Okta Session (#5948)
Fixes #5947

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2026-04-22 08:16:42 -04:00
Susan d8a39869c5 Add Entity related integrations ML rules with _ea job IDs and min_stack_version 9.4.0 (#5909)
Co-authored-by: Shashank K S <Shashank.Suryanarayana@elastic.co>
2026-04-22 17:36:35 +05:30
Ruben Groenewoud 4512ec1735 [New Rules] False Negatives for New BPFDoor Variants (#5939)
* [New Rules] False Negatives for New BPFDoor Variants

* Update defense_evasion_file_creation_world_writeable_dir_by_unusual_process.toml

* Update defense_evasion_file_creation_world_writeable_dir_by_unusual_process.toml

* IG Additions

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-04-22 08:03:32 +02:00
Eric Forte 67313bcd2a [FR] Workflow Updates for Automatically Bumping Stack Version (#5941) 2026-04-21 11:48:48 -04:00
Jonhnathan 8d25a7ddce [Rule Tuning] Update MDE tags to "Microsoft Defender XDR" (#5927)
* [Rule Tuning] Fix MS Defender XDR tag

* bump upodated_date
2026-04-20 18:38:09 -03:00
Eric Forte b2e4925c7f [Rule Tuning] Abnormally Large DNS Response (#5922)
* Refine event dataset and remove flag on connection type
2026-04-20 09:28:01 -04:00
Mika Ayenson, PhD ff73f13446 [Docs] Refresh DEX Philosophy (#5933)
* refresh dex philosophy

* version bump

* Apply suggestions from code review

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* final updates

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2026-04-10 16:40:06 -05:00
Terrance DeJesus deab1c0161 [Rule Tuning] Change event.dataset to data_stream.dataset (#5943)
* [Rule Tuning] Change event.dataset to data_stream.dataset

* updating ESQL field names
2026-04-10 12:27:52 -04:00
Eric Forte 9736407ef3 [FR] [DAC] Initial Yaml Support (#5821)
* Initial Yaml Support
2026-04-10 11:29:15 -04:00
Jonhnathan a9d0d79a5b [Rule Tuning] Process Created with an Elevated Token (#5934) 2026-04-10 11:47:27 -03:00
Eric Forte 984be4a1ac [Bug] Small bugfix to address update navigator edge case (#5942)
* [Bug] Small bugfix to address update navigator edge case
2026-04-10 08:53:56 -04:00
Eric Forte 1503976d10 [FR] Load ECS mapping based on supplied stack version (#5925)
* Load ECS mapping based on supplied stack version
2026-04-09 12:40:10 -04:00
Martijn Laarman 2e8ff76172 Migrate docs workflows from preview-build to docs-actions (#5897)
Moves docs CI/CD from elastic/docs-builder to elastic/docs-actions.
Part of elastic/docs-eng-team#474

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-04-09 08:20:30 -05:00
Samirbous b5e5822c1f Update persistence_python_launch_agent_or_daemon_creation_first_occurrence.toml (#5937) 2026-04-08 18:11:43 -03:00
github-actions[bot] c601edfbb3 Lock versions for releases: 8.19,9.1,9.2,9.3 (#5930) 2026-04-08 19:44:16 +05:30
Samirbous 7fcbec380b Update command_and_control_rmm_after_msi_install.toml (#5901) 2026-04-08 08:01:10 -05:00
Jonhnathan 09e5bf04f4 [Rule Deprecation] SUNBURST Command and Control Activity (#5928) 2026-04-08 07:25:05 -05:00