Commit Graph

2411 Commits

Author SHA1 Message Date
Terrance DeJesus 8b84c26286 [Rule Tuning] Okta Sign-In Events via Third-Party IdP - Convert to New Terms (#5544)
* [Rule Tuning] Okta Sign-In Events via Third-Party IdP - Convert to New Terms
Fixes #5543

* fixed query optimization
2026-01-12 09:40:09 -05:00
Samirbous 7c36743ce6 [New] Multiple Alerts in Same ATT&CK Tactic by Host (#5550)
* [New] Multiple Alerts in Same ATT&CK Tactic by Host

This rule uses alert data to determine when multiple alerts in the same phase of an attack involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.

* Update multiple_alerts_same_tactic_by_host.toml

* Update rules/cross-platform/multiple_alerts_same_tactic_by_host.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update non-ecs-schema.json

* Update multiple_alerts_same_tactic_by_host.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-01-12 14:19:51 +00:00
Terrance DeJesus 4e5b8be0de [Rule Tuning] New Okta Authentication Behavior Detected (#5542)
* [Rule Tuning] New Okta Authentication Behavior Detected
Fixes #5541

* tuning New Okta Authentication Behavior Detected

* Update rules_building_block/initial_access_new_okta_authentication_behavior.toml

* updated tag, adjusted lookback window
2026-01-12 09:01:32 -05:00
Terrance DeJesus de42a5aabd [New Rule] ConsentFix Detections (#5485)
* adjusting/adding consentfix detections

* updating investigation guides to be standardized

* making investigation guides more contextual

* updating descriptions

* Update rules/integrations/azure/initial_access_entra_id_oauth_auth_code_grant_unusual_app_resource_user.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* reducing new terms window to 7d

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-01-12 08:45:50 -05:00
Samirbous 8bc4829432 [Tuning] Multiple Cloud Secrets Accessed by Source Address (#5549)
* Update credential_access_multi_could_secrets_via_api.toml

* Update credential_access_multi_could_secrets_via_api.toml

* Update credential_access_multi_could_secrets_via_api.toml

* Update credential_access_multi_could_secrets_via_api.toml
2026-01-12 11:44:31 +00:00
Terrance DeJesus 7b4611713b [Rule Tuning] Entra ID Protection Sign-in and User Risk Detection Rules - Filter Remediated Risk States (#5535)
Fixes #5534

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-09 11:27:52 -05:00
Samirbous 2d5d826be7 [New] Multiple External EDR Alerts by Host (#5540)
* [New] Multiple External EDR Alerts by Host

This rule uses alert data to determine when multiple external EDR alerts involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml

* Update multiple_external_edr_alerts_by_host.toml
2026-01-09 15:51:51 +00:00
Mika Ayenson, PhD f123ffa0f8 [Rule Tuning] GenAI DR Tuning (#5506) 2026-01-09 08:23:03 -06:00
Samirbous b39cfc34e6 [New] First Time Seen Elastic Defend Behavior Alert (#5528)
* [New] First Time Seen Elastic Defend Behavior Alert

This rule detects Elastic Defend behavior alerts that are observed for the first time today when compared against
the previous 7 days of alert history. It highlights low-volume, newly observed alerts tied to a specific detection rule on a single agent, which may indicate early-stage malicious activity or initial execution of suspicious behavior :

* Update first_time_seen_elastic_defend_alert.toml

* ++

* Update first_time_seen_elastic_defend_alert.toml

* ++

* Update fist_time_seen_elastic_detection_rule.toml

* Update fist_time_seen_elastic_detection_rule.toml

* Update rules/cross-platform/first_time_seen_elastic_defend_alert.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/fist_time_seen_elastic_detection_rule.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/fist_time_seen_elastic_detection_rule.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update fist_time_seen_elastic_detection_rule.toml

* Update first_time_seen_elastic_defend_alert.toml

* Update rules/cross-platform/first_time_seen_elastic_defend_alert.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/cross-platform/first_time_seen_elastic_defend_alert.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/cross-platform/fist_time_seen_elastic_detection_rule.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update first_time_seen_elastic_defend_alert.toml

* Update and rename fist_time_seen_elastic_detection_rule.toml to newly_observed_elastic_detection_rule.toml

* Rename first_time_seen_elastic_defend_alert.toml to newly_observed_elastic_defend_alert.toml

* Update newly_observed_elastic_defend_alert.toml

* Update newly_observed_elastic_detection_rule.toml

* Update newly_observed_elastic_defend_alert.toml

* Update newly_observed_elastic_detection_rule.toml

* Update newly_observed_elastic_defend_alert.toml

* Update newly_observed_elastic_detection_rule.toml

* Update newly_observed_elastic_detection_rule.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-09 10:34:32 +00:00
Samirbous 5081735acc [New] Potential Persistence via Mandatory User Profile (#5530)
* [New] Potential Persistence via Mandatory User Profile

https://deceptiq.com/blog/ntuser-man-registry-persistence

* Update persistence_suspicious_user_mandatory_profile_file.toml

* Update persistence_suspicious_user_mandatory_profile_file.toml
2026-01-09 09:35:47 +00:00
Samirbous fde2fa972e [Tuning] Process Created with an Elevated Token (#5532)
* [Tuning] Process Created with an Elevated Token

https://github.com/elastic/detection-rules/issues/5492

* Update privilege_escalation_via_token_theft.toml
2026-01-09 09:23:37 +00:00
Samirbous e7cb01778b [Tuning] SMB (Windows File Sharing) Activity to the Internet (#5533)
* [Tuning] SMB (Windows File Sharing) Activity to the Internet

converted to new term  (history search window set to 5 days by destination.ip) to reduce alerts volume. https://github.com/elastic/detection-rules/issues/5490

* Update initial_access_smb_windows_file_sharing_activity_to_the_internet.toml

* Update rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml

* Update rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-08 18:52:09 -03:00
Ruben Groenewoud 34daf12d51 [New Rules] Several GitHub Related Rules (#5470)
* [New Rules] Several GitHub Related Rules

* Added additional references

* Update defense_evasion_secret_scanning_disabled.toml

* Update persistence_new_pat_created.toml

* Added two more rules

* ++

* Update rules/integrations/github/impact_github_repository_activity_from_unusual_ip.toml

* Added github.repository_public to non_ecs

* Update impact_github_repository_activity_from_unusual_ip.toml

* Update rules/integrations/github/impact_high_number_of_failed_protected_branch_force_pushes_by_user.toml

* ++

* Update rules/integrations/github/exfiltration_high_number_of_cloning_by_user.toml

* Update rules/integrations/github/impact_high_number_of_closed_pull_requests_by_user.toml

* Update rules/integrations/github/impact_high_number_of_protected_branch_force_pushes_by_user.toml

* ++

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-08 17:19:12 +01:00
Ruben Groenewoud 11769a4be3 [New/Tuning] Several New Linux Rules (#5531)
* [New/Tuning] Several New Linux Rules

* Update collection_potential_video_recording_or_screenshot_activity.toml

* Update discovery_dmidecode_system_discovery.toml

* Update rules/linux/collection_potential_audio_recording_activity.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update exfiltration_potential_wget_data_exfiltration.toml

* [New Rule] Linux User or Group Deletion

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-01-08 16:00:50 +01:00
Ruben Groenewoud ee936cb154 [New Rule] Potential Password Spraying Attack via SSH (#5515)
* [New Rule] Potential Password Spraying Attack via SSH

* ++

* Update rules/linux/credential_access_potential_password_spraying_attack.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update credential_access_potential_password_spraying_attack.toml

* Update credential_access_potential_password_spraying_attack.toml

* Change time bucket duration from 1 to 5 minutes

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-08 13:43:52 +01:00
Ruben Groenewoud 1c1632e0b9 [Rule Tuning] Linux DR Tuning - 3 (#5483)
* [Rule Tuning] Linux DR Tuning - 3

* Update rules/linux/credential_access_aws_creds_search_inside_container.toml

* Adjust thresholds and expand event action handling

* Update credential_access_potential_linux_ssh_bruteforce_external.toml

* Increase threshold for SSH brute force detection

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_ssh_backdoor_log.toml

Removed 'auditbeat-*' from the index list.

* Refactor credential access rule for clarity

Removed redundant event.action expansion and filtering logic.

* Refactor ESQL query for SSH brute force detection

Refactor ESQL query to improve readability and maintainability by moving the event.action expansion and filtering logic.

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_potential_successful_linux_ftp_bruteforce.toml

* Update credential_access_potential_successful_linux_rdp_bruteforce.toml

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Add time window truncation to bruteforce rule

* Add time window truncation to SSH brute force rule

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update SSH brute force detection rule to EQL

* Update CIDR match conditions for SSH brute force rule

* Update EQL query for SSH brute force detection
2026-01-08 13:32:43 +01:00
Ruben Groenewoud e1698890a4 [Rule Tuning] Linux DR Tuning - 7 (#5504)
* [Rule Tuning] Linux DR Tuning - 7

* Update execution_egress_connection_from_entrypoint_in_container.toml

* Update execution_kubernetes_direct_api_request_via_curl_or_wget.toml

* Update rules/linux/execution_perl_tty_shell.toml

* Update execution_perl_tty_shell.toml

* Update rules/linux/execution_unix_socket_communication.toml

* Update execution_file_made_executable_via_chmod_inside_container.toml

* Remove duplicate Crowdstrike data source entry

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 11:10:46 +01:00
Ruben Groenewoud ccd3f70ee8 [Rule Tuning] Linux DR Tuning - 6 (#5497)
* [Rule Tuning] Linux DR Tuning - 6

* Fix syntax error in discovery_esxi_software_via_grep.toml

* Update discovery_pam_version_discovery.toml

* Update discovery_virtual_machine_fingerprinting.toml

* Revise investigation title for kernel module enumeration

Updated the title of the investigation section to clarify focus on unusual kernel module enumeration.

* Update discovery_port_scanning_activity_from_compromised_host.toml

* Enhance ESQL query for subnet scanning detection

Updated ESQL query to include additional fields and conditions for better analysis of connection attempts from compromised hosts.

* Remove Elastic Endgame data source from rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:45:32 +01:00
Ruben Groenewoud c2747b0b29 [Rule Tuning] Linux DR Tuning - 4 (#5484)
* [Rule Tuning] Linux DR Tuning - 4

* Update defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Remove duplicate host.name entry in TOML file

* Fix formatting in defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Add additional fields to base64 decoding activity rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:11:05 +01:00
Ruben Groenewoud b13afcdeaa [Rule Tuning] Linux DR Tuning - 8 (#5505)
* [Rule Tuning] Linux DR Tuning - 8

* Revise investigation guide for THC tool downloads

Updated investigation guide to reflect THC tool instead of SSH-IT worm. Enhanced description for clarity.

* Update exfiltration_unusual_file_transfer_utility_launched.toml

* Refine ESQL query for brute force malware detection

Updated the query to include additional fields and modified the conditions for filtering events.

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:01:11 +01:00
Ruben Groenewoud d968f62a5a [Rule Tuning] Linux DR Tuning - 10 (#5510)
* [Rule Tuning] Linux DR Tuning - 10

* Update persistence_udev_rule_creation.toml

* Refactor ESQL query for Linux process events

* Refactor query in persistence_web_server_sus_command_execution rule

Removed unnecessary fields from the query and added new fields for event dataset and data stream namespace.

* Update persistence_systemd_netcon.toml

* Update persistence_web_server_sus_child_spawned.toml

* Refactor process.parent.name conditions in TOML file

* Update persistence_web_server_unusual_command_execution.toml

* Update persistence_web_server_unusual_command_execution.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 09:32:57 +01:00
Samirbous f98f4e5a95 [Tuning] Suspicious DLL Loaded for Persistence or Privilege Escalation (#5525)
* Update privilege_escalation_persistence_phantom_dll.toml

* Update privilege_escalation_persistence_phantom_dll.toml

* Update privilege_escalation_persistence_phantom_dll.toml
2026-01-07 21:03:44 +00:00
Terrance DeJesus 98058816a7 [Rule Tuning] Entra ID Excessive Account Lockouts Detected (#5502)
* [Rule Tuning] Entra ID Excessive Account Lockouts Detected
Fixes #5501

* linting

* removed newlines

* Update rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 11:38:04 -05:00
Samirbous 0165b97d30 [New] Suspected Lateral Movement from Compromised Host (#5521)
* [New] Suspected Lateral Movement from Compromised Host

Detects potential lateral movement or post-compromise activity by correlating alerts where the host.ip of one alert matches the source.ip of a subsequent alert. This behavior may indicate a compromised host being used to authenticate to another system or resource, including cloud services.

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update multiple_alerts_by_host_ip_and_source_ip.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:23:16 +00:00
Ruben Groenewoud 38e2e4766f [Rule Tuning] Linux DR BBR Tuning (#5514)
* [Rule Tuning] Linux DR BBR Tuning

* Update discovery_getconf_execution.toml

* Fix typo in process.args for dscl command

* Update persistence_web_server_sus_file_creation.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:52:40 +01:00
Ruben Groenewoud ca0f32f28e [Rule Tuning] Linux DR CP Tuning (#5512)
* [Rule Tuning] Linux DR CP Tuning

* Update date bump

* Fix privilege escalation rule for teleport executable

* ++

* Revert "++"

This reverts commit 386dc909b89dfcbe21628585489605fd0206e3c2.

* Update rules/cross-platform/defense_evasion_deletion_of_bash_command_line_history.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:40:37 +01:00
Ruben Groenewoud 80ee91b0f2 [Rule Tuning] Linux DR Tuning - 11 (#5511)
* [Rule Tuning] Linux DR Tuning - 11

* Update privilege_escalation_potential_suid_sgid_exploitation.toml

* Update rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml

* Update privilege_escalation_docker_escape_via_nsenter.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:31:13 +01:00
Ruben Groenewoud a973da1a6b [Rule Tuning] Linux DR Tuning - 9 (#5508)
* [Rule Tuning] Linux DR Tuning - 9

* Update rules/linux/persistence_apt_package_manager_file_creation.toml

* Fix formatting in persistence_boot_file_copy.toml

* Update persistence_chkconfig_service_add.toml

* Change user.id values to string format in TOML

* Fix condition for Java process working directory

* Fix logical operator in OpenSSL passwd hash rule

* Fix syntax for working_directory check

* Fix condition for original file name check

* Update persistence_web_server_unusual_command_execution.toml

* Add cloud CLI tools to persistence rules

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:18:38 +01:00
Ruben Groenewoud 473df70fbb [Rule Tuning] Linux DR Tuning - 5 (#5494)
* [Rule Tuning] Linux DR Tuning - 5

* Fix query syntax for shared object detection rule

* Update defense_evasion_kernel_module_removal.toml

* Fix condition for process working directory check

* Refactor query in defense_evasion_symlink_binary rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 15:55:06 +01:00
Ruben Groenewoud 066096f766 [Rule Tuning] Linux DR Tuning - 2 (#5481)
* [Rule Tuning] Linux DR Tuning - 2

* Update command_and_control_linux_proxychains_activity.toml
2026-01-06 17:00:55 +01:00
Ruben Groenewoud 019c263ed2 [Rule Tuning] Linux DR Tuning - 1 (#5122)
* [Rule Tuning] Linux DR Tuning - 1

* Added integrations

* Update command_and_control_git_repo_or_file_download_to_sus_dir.toml

* Update collection_linux_clipboard_activity.toml

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-06 16:18:04 +01:00
Samirbous 08663dee79 Update persistence_webshell_detection.toml (#5524)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-02 12:45:50 -03:00
Samirbous 74d6fe95c9 [New] Multiple Elastic Defend Alerts from Single Process Tree (#5522)
* [New] Multiple Elastic Defend Alerts from Single Process Tree

Detects multiple Elastic Defend EDR alerts originating from the same process tree, indicating coordinated malicious activity. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.

* Update multiple_alerts_edr_elastic_same_process_tree.toml

* Update rules/cross-platform/multiple_alerts_edr_elastic_same_process_tree.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/cross-platform/multiple_alerts_edr_elastic_same_process_tree.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/cross-platform/multiple_alerts_edr_elastic_same_process_tree.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update multiple_alerts_edr_elastic_same_process_tree.toml

* Update multiple_alerts_edr_elastic_same_process_tree.toml

* Update multiple_alerts_edr_elastic_same_process_tree.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-02 15:13:25 +00:00
Samirbous c7adfd8b6d [Tuning] Elastic Defend and Network Security Alerts Correlation (#5518)
* Update multiple_alerts_elastic_defend_netsecurity_by_host.toml

* Update multiple_alerts_elastic_defend_netsecurity_by_host.toml

* Update multiple_alerts_elastic_defend_netsecurity_by_host.toml

* Update multiple_alerts_elastic_defend_netsecurity_by_host.toml

* Update multiple_alerts_elastic_defend_netsecurity_by_host.toml
2026-01-02 14:40:06 +00:00
Samirbous f337926c52 Update initial_access_execution_susp_react_serv_child.toml (#5503)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-01 15:27:33 -03:00
Terrance DeJesus b0d3d7d960 [Rule Tuning] Entra ID OAuth PRT Issuance to Non-Managed Device Detected (#5464)
* [Rule Tuning] Entra ID OAuth PRT Issuance to Non-Managed Device Detected
Fixes #5463

* Adjusted description in investigation guide
2025-12-21 16:30:32 -05:00
Terrance DeJesus 0fd3df6239 [Rule Tuning] Entra ID User Sign-in with Unusual Registered Device (#5466)
Fixes #5465
2025-12-21 15:51:13 -05:00
Isai a14a1fd068 [Rule Tuning] AWS Service Quotas Multi-Region GetServiceQuota Requests (#5468)
* [Rule Tuning] AWS Service Quotas Multi-Region GetServiceQuota Requests

This rule is alerting as expected with very few instances in telemetry (only have data from 1 cluster).
- added more fields for context in the query.
- added metadata fields to query
- reduced execution window
- added highlighted fields

#### screenshot of working query with additional context

* Update rules/integrations/aws/discovery_servicequotas_multi_region_service_quota_requests.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-12-19 16:46:45 -05:00
Isai 284d7d5b23 [Rule Tuning] AWS SQS Queue Purge (#5457)
This rule is triggering as expected with moderate telemetry volume (high spikes for what looks like expected cleanup jobs) in specific cluster. No changes needed to the rule query.

- updated description, FP and IG
- reduced execution window
- updated highlighted fields
2025-12-19 15:51:43 -05:00
Isai e8f317817e [Rule Tunings] AWS Config Rule Tunings (#5456)
### AWS Config Resource Deletion
- added exclusions for services that perform Config modifications by design, reducing noise by 97% over the last 30 days.
- added success criteria to query as well
- increased severity to medium as this alert should be triaged
- updated description, false positive and investigation guide sections
- reduced execution window
- updated MITRE
- updated tags
- added highlighted fields

### AWS Configuration Recorder Stopped
no major query changes needed for this rule, performing as expected in telemetry with low volume as this is more rare activity.
- updated description, false positive and investigation guide sections
- reduced execution window
- updated MITRE
- updated tags
- added highlighted fields
2025-12-19 13:58:45 -05:00
Isai 97b0bd84d8 [Rule Tunings] AWS Lambda Rules (#5451)
* [Rule Tunings] AWS Lambda Rules

#### AWS Lambda Layer Added to Existing Function
This rule was missing alerts for the `UpdateFunctionConfiguration` action due to a missing wildcard.
- added missing wildcard to query
- reduced execution window
- updated description, FP and IG sections
- added highlighted fields

#### AWS Lambda Function Policy Updated to Allow Public Invocation
- changed this query to use EQL instead of KQL to optimize wildcard usage
- uses `event.type` as `event_category_override`
- reduced execution window
- updated description, FP and IG sections
- added highlighted fields

* Update rules/integrations/aws/persistence_lambda_backdoor_invoke_function_for_any_principal.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-12-19 13:45:47 -05:00
Isai 12d257ed56 [Rule Tuning] AWS EC2 EBS Snapshot Access Removed (#5499)
- fixed mistake in creation date
- excludes `backup.amazon.com` FP from telemetry
2025-12-19 13:28:27 -05:00
Jonhnathan b956a4350f [Rule Tuning] Multiple Alerts Involving a User (#5498)
* [Rule Tuning] Multiple Alerts Involving a User

* Update multiple_alerts_involving_user.toml

* Update multiple_alerts_involving_user.toml

* Update non-ecs-schema.json

* ++

* Update multiple_alerts_involving_user.toml

* ++

* Update non-ecs-schema.json
2025-12-19 12:57:25 -03:00
Jonhnathan 1d64bf0d76 [Rule Tuning] Potential Network Scan Detected (#5495)
* [Rule Tuning] Potential Network Scan Detected

* Update discovery_potential_port_scan_detected.toml

* Update rules/network/discovery_potential_port_scan_detected.toml

* ++

* Update discovery_potential_port_scan_detected.toml

* Update discovery_potential_port_scan_detected.toml
2025-12-19 12:38:57 -03:00
Ruben Groenewoud 5bc834bfc6 [Rule Tuning] Shared Object Created or Changed by Previously Unknown … (#5469)
* [Rule Tuning] Shared Object Created or Changed by Previously Unknown Process

* Update rules/linux/persistence_shared_object_creation.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-12-19 14:32:31 +01:00
Samirbous 30883ab9c0 [New] React2Shell Network Security Alert (#5445)
* [New] React2Shell Network Security Alert

KQL query that reports network security signatures for React2Shell from 4 integrations (Suricata, Fortigate, Cisco FTD and PANW).

* Update initial_access_react_server_rce_network_alerts.toml

* cisco_ftd schema

 build-schemas -i cisco_ftd

* Update initial_access_react_server_rce_network_alerts.toml

* Update pyproject.toml

* Update rules/network/initial_access_react_server_rce_network_alerts.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update pyproject.toml

* Revert "cisco_ftd schema"

This reverts commit c97cf58b2180b3c13c29e3901b2a03bfd12463a2.

* cisco_ftd schema and manifest

* Update pyproject.toml

* Revert "cisco_ftd schema and manifest"

This reverts commit ff2200f70f0e0cf94864c49fe8e8a13fda930bc9.

* Revert "Update pyproject.toml"

This reverts commit d382fcdaaa992cac2d4370f5656f81c530b6ec5a.

* Reapply "cisco_ftd schema"

This reverts commit 1494d4aa3e4f07cebd448fcc2597b4c836a989db.

* Revert "Update pyproject.toml"

This reverts commit 39e1f5e9e34cc0500bd82bc4662ece259a5234ba.

* Revert "cisco_ftd schema"

This reverts commit c97cf58b2180b3c13c29e3901b2a03bfd12463a2.

* ++

* Update pyproject.toml

* integration_cisco_ftd

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-12-19 12:22:44 +00:00
Samirbous 95cf506c9d [New] Suricata and Elastic Defend Network Correlation (#5443)
* [New] Suricata and Elastic Defend - Command and Control Correlation

This detection correlates Suricata alerts and events with Elastic Defend network events to identify the source process
performing the network activity.

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update rules/cross-platform/command_and_control_suricata_elastic_defend_c2.toml

* Update rules/cross-platform/command_and_control_suricata_elastic_defend_c2.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update command_and_control_suricata_elastic_defend_c2.toml

* Update command_and_control_suricata_elastic_defend_c2.toml

* add suricata to schemas

* merge from main

* reset schemas

* Update rules/cross-platform/command_and_control_suricata_elastic_defend_c2.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Mika Ayenson <Mika.ayenson@elastic.co>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-12-19 09:08:31 +00:00
Terrance DeJesus 4c9317b9cc [Rule Tuning] Entra ID User Sign-in with Unusual Client (#5473)
* [Rule Tuning] Entra ID User Sign-in with Unusual Client
Fixes #5472

* linting

* Update rules/integrations/azure/initial_access_entra_id_rare_app_id_for_principal_auth.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* removed duplicate client ID

* fixed investigation guide

* Update rules/integrations/azure/initial_access_entra_id_rare_app_id_for_principal_auth.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
2025-12-18 20:04:11 -05:00
Terrance DeJesus 1bd7dea8ed [Rule Tuning] Entra ID OAuth user_impersonation Scope for Unusual User and Client (#5462)
Fixes #5461
2025-12-18 19:55:02 -05:00
Isai bc6ad03f86 [Rule Tuning] AWS EventBridge Rule Disabled or Deleted (#5458)
There was a mistake in the query for this rule. It was looking for `event.provider: eventbridge.amazonaws.com` instead of `events.amazonaws.com`. So we have no existing telemetry for this rule. However, I have tested the behavior properly and ensured the new query does alert as expected. I will monitor this rule in telemetry moving forward to gauge it's performance.

- query change `event.provider: events.amazonaws.com`
- reduced execution window
- updated description, FP and IG sections
- updated tags
- added highlighted fields
2025-12-18 16:56:04 -05:00