Commit Graph

532 Commits

Author SHA1 Message Date
Ross Wolf f7c154cb8f [Rule Tuning] Remove \Program Files*\ style wildcards (#1369)
* Remove \Program Files*\ style wildcards
* Convert string and remote trailing .exe check
* Fix syntax
* Escape dot
* Add missing `and`
* Fix syntax for regex string
* Convert * to .* for regex

(cherry picked from commit 7b62fe296d)
2021-07-22 17:55:50 +00:00
Justin Ibarra fbc19bebb8 [Rule Tuning] Update EQL rules with lookback < maxspan (#1362)
* [Rule Tuning] Update EQL rules with lookback < maxspan
* update intervals to be at least interval >= 1/2 maxspan

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>

(cherry picked from commit 4aab1278bf)
2021-07-22 17:09:36 +00:00
Ross Wolf b13c369dab [Fleet] Track integrations in folder and metadata (#1372)
* Track integrations in folder and metadata
* Remove duplicate entry
* Update note and tests

Removed changes from:
- rules/cyberark/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml
- rules/cyberark/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml

(selectively cherry picked from commit 1882f4456c)
2021-07-21 21:25:22 +00:00
Ross Wolf a578a3815c [Rule Tuning] Convert unusual extension rule to regex (#1368)
* Convert unusual extension rule to regex
* Update defense_evasion_file_creation_mult_extension.toml
* Fix date
* Fix extension

(cherry picked from commit 9f3d5328f4)
2021-07-21 17:49:56 +00:00
Ross Wolf 92d432c78b [Rule Tuning] Creation of Hidden Files and Directories (#1357)
* [Rule Tuning] Creation of Hidden Files and Directories
* Remove redundant `A` from the regex

(cherry picked from commit 9b559d0cd9)
2021-07-21 17:48:07 +00:00
David French b81f29cddf [Rule Tuning] Update Google Workspace rules to use google_workspace event schema (#1374)
* use google_workspace event schema

* update to use google_workspace schema

(cherry picked from commit 23626b814c)
2021-07-21 17:39:16 +00:00
dstepanic17 acc15485fa [New Rule] Windows Defender Exclusions Added via PowerShell (#1370)
* Added new rule

* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>

* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>

* Added pwsh.exe to original name

* Added PowerShell MITRE reference

* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

(cherry picked from commit fbd4cf2117)
2021-07-21 16:54:39 +00:00
Austin Songer 34b37c0bfd [Rule Tuning] Mimikatz powershell module activity detected (#1297)
* update query
* add indexes

(cherry picked from commit 95e6458c6e)
2021-07-21 07:08:31 +00:00
Andrew Pease f0514de6a2 [Rule Tuning] Add Filebeat and Auditbeat to Network Rules (#1282)
* standardized indices and added the from field

(cherry picked from commit 34df7c6b89)
2021-07-21 06:59:52 +00:00
Austin Songer f64a9599d0 [New Rule] O365 Excessive SSO Logon Errors (#1215)
(cherry picked from commit 64c3f7cdc5)
2021-07-21 06:55:27 +00:00
Austin Songer 47ca92f97a [New Rule] Disable Windows Event and Security Logs (#1181)
(cherry picked from commit c82790f588)
2021-07-21 06:45:03 +00:00
Austin Songer 77b80d7e6d [Rule Tuning] Suspicious CertUtil Commands (#1180)
* update name to Suspicious CertUtil Commands
* update description, query, and filename

(cherry picked from commit 4a11ef9514)
2021-07-21 06:27:05 +00:00
Austin Songer c6987f2484 [Rule Tuning] External IP Lookup from Non-Browser Process (#1147)
* Added a couple domains

ipapi.co
ip-lookup.net
ipstack.com

(cherry picked from commit 920d973064)
2021-07-21 05:48:06 +00:00
Samirbous f052e81907 [New Rule] Parent Process PID Spoofing (#1338)
* [New Rule] Parent Process PID Spoofing

* excluding sihost FPs

* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>

* relinted and added 2 non ecs fields

* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

(cherry picked from commit 81ab43898c)
2021-07-15 20:56:12 +00:00
Oliver Gupte fe816747e7 [APM] Adds APM data stream 'traces-apm*' to apm rules (#105334) (#1335)
(cherry picked from commit 7ec97e622f)
2021-07-13 13:05:31 +00:00
Samirbous 43dd58d11d [New Rule] Potential PrintNightmare Exploitation rules (#1326)
* [New Rule] Potential PrintNightmare Exploitation rules

* added Potential PrintNightmare File Modification

* added spoolsv as process name to narrow more the scope

* added Suspicious Print Spooler File Deletion

* removed Suspicious Print Driver Registry Modification cuz of potential noise

* Update privilege_escalation_printspooler_malicious_registry_modification.toml

* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* adjusted description and added a comment for sysmon compatibility

* added FP note and relinted all files

* Update rules/windows/privilege_escalation_printspooler_malicious_driver_file_changes.toml

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

* Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

* Update rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

* relinted

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
(cherry picked from commit 89420ae976)
2021-07-07 16:56:55 +00:00
Samirbous dd24dabb0d [New Rule] Complementary Rules for Recent REvil TTPs (#1329)
* [New Rule] Complementary Rules for Recent REvil TTPs

* added OFN

* relinted and added T1574.002

* removed new line

* Update defense_evasion_disabling_windows_defender_powershell.toml

* corrected rule name

* added a reference url

* Update rules/windows/defense_evasion_disabling_windows_defender_powershell.toml

Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com>

* Update rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml

Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com>

* Update rules/windows/defense_evasion_execution_windefend_unusual_path.toml

Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com>

* Update rules/windows/defense_evasion_execution_windefend_unusual_path.toml

Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com>

Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com>
(cherry picked from commit 9fadc4c1dc)
2021-07-07 15:03:09 +00:00
Justin Ibarra 68e7b6bbe3 Make "config" in note field consistent (#1310)
* Add test to ensure consistent config in note field
* Update inconsistent rule

(cherry picked from commit 63a39665e3)
2021-07-06 23:54:18 +00:00
Austin Songer 102b9ff7d5 [New Rule] AWS RDS Security Group Created (#1260)
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: Brent Murphy <bmurphy@endgame.com>
(cherry picked from commit 8e451f2318)
2021-06-23 00:15:15 +00:00
Austin Songer 6fd6bb1712 [New Rule] AWS RDS Security Group Deleted (#1261)
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: Brent Murphy <bmurphy@endgame.com>
(cherry picked from commit fe14cd23ed)
2021-06-23 00:09:32 +00:00
Austin Songer 7749086f3b [New Rule] AWS RDS Instance Creation (#1269)
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: Brent Murphy <bmurphy@endgame.com>
(cherry picked from commit 9d4574b267)
2021-06-23 00:03:06 +00:00
Austin Songer 78c75d71b0 [New Rule] AWS RDS Snapshot Export (#1270)
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: Brent Murphy <bmurphy@endgame.com>
(cherry picked from commit ccae1dc841)
2021-06-22 23:58:29 +00:00
Austin Songer 4823a40d19 [Rule Tuning] Potential password spraying of microsoft 365 user accounts (#1164)
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com>

(cherry picked from commit c215c44809)
2021-06-22 17:36:32 +00:00
Ross Wolf ba5f3eed82 Switch from process.ppid to process.parent.pid (#1255)
* Switch from process.ppid to process.parent.pid
* Bump updated date
* Bump updated date

(cherry picked from commit 31f63e728e)
2021-06-22 15:10:59 +00:00
Brent Murphy 549cc9992d [Rule Tuning] Attempts to Brute Force a Microsoft 365 User Account (#1251)
* Update credential_access_microsoft_365_brute_force_user_account_attempt.toml

* add authors

(cherry picked from commit d8ef9a81ef)
2021-06-22 14:39:09 +00:00
Brent Murphy c493c5df67 Update initial_access_smb_windows_file_sharing_activity_to_the_internet.toml (#1225)
(cherry picked from commit a8c9d7174f)
2021-06-22 14:22:18 +00:00
Austin Songer 74132fbbe9 [New Rule] AWS Route 53 Domain Transferred to Another Account (#1198)
(cherry picked from commit ea9a23af8d)
2021-06-22 06:09:14 +00:00
Austin Songer 10d22d9477 [New Rule] AWS Route 53 Domain Transfer Lock Disabled (#1197)
(cherry picked from commit 2cadee1718)
2021-06-22 06:06:10 +00:00
Austin Songer b8a3f43b99 [New Rule] EC2 Full Network Packet Capture Detected (#1175)
(cherry picked from commit d7e0e37e54)
2021-06-22 06:01:05 +00:00
Austin Songer 3996e94bfd [New Rule] Azure Service Principal Credentials Added (#1169)
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
(cherry picked from commit 6986f28af6)
2021-06-22 05:50:17 +00:00
Justin Ibarra 18765631fb Fix rules which were note using v2 license (#1291)
(cherry picked from commit e0fa25ae8e)
2021-06-16 14:21:50 +00:00
Ross Wolf 915c2dea2a [Bug] Fix ML job IDs that used hyphens (#1287)
* Fix ML job IDs that used hyphens
* Update ml_high_count_network_denies.toml
* Update ml_spike_in_traffic_to_a_country.toml
* Set updated_date

(cherry picked from commit 49cb2e8dbf)
2021-06-15 17:41:04 +00:00
David French fb93735c0f [Rule Tuning] Attempts to Brute Force an Okta User Account (#1216)
* update rule.threshold field value

* add rule authors

* bump updated_date

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
(cherry picked from commit 177cfc85bf)
2021-06-15 16:08:09 +00:00
Apoorva Joshi cce7c126b6 Updating rules to query v2 (#1254)
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
(cherry picked from commit 1f7c88c6f4)
2021-06-15 14:21:09 +00:00
Brent Murphy 683621fe62 [Rule Tuning] Update network rule address blocks (#1227)
* Update network rule address blocks
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com>

(cherry picked from commit 12577f7380)
2021-06-15 13:23:16 +00:00
Austin Songer 3d6cefb296 [Rule Tuning] Attempts to brute force a microsoft 365 user account (#1163)
Update rules/microsoft-365/credential_access_microsoft_365_brute_force_user_account_attempt.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com>

(cherry picked from commit 546e43071c)
2021-06-15 13:20:40 +00:00
Brent Murphy 8b3d085f73 Update persistence_suspicious_com_hijack_registry.toml (#1244)
(cherry picked from commit 13bf55480a)
2021-06-14 13:00:39 +00:00
Austin Songer 5d41f2719a [New Rule] AWS EC2 VM Export Failure (#1142)
* New Rule: AWS EC2 VM Export Failure

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

* Update exfiltration_ec2_vm_export_failure.toml

Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com>
(cherry picked from commit 6b45186827)
2021-06-09 19:03:56 +00:00
Brent Murphy 1eb36b1a9e [New Rule] Modification of AmsiEnable Registry Key (#1248)
* Create defense_evasion_amsienable_key_mod.toml

(cherry picked from commit fce022c275)
2021-06-07 17:21:36 +00:00
Brent Murphy f91e0facea Update privilege_escalation_persistence_phantom_dll.toml (#1228)
(cherry picked from commit 6626cbb943)
2021-06-01 13:29:25 +00:00
Brent Murphy f9805954ee [New Rule] Unusual Network Connection via DllHost (#1232)
* Create defense_evasion_unusual_network_connection_via_dllhost.toml
* add timestamp override

(cherry picked from commit c457614e37)
2021-05-28 19:09:26 +00:00
Brent Murphy acfca54f73 [New Rule] Suspicious Execution from a Mounted Device (#1230)
* Create defense_evasion_suspicious_execution_from_mounted_device.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

(cherry picked from commit 31e8d03438)
2021-05-28 18:44:24 +00:00
Austin Songer fcd29373d5 [Rule Tuning] High Number of Okta User Password Reset or Unlock Attempts (#1200)
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com>

(cherry picked from commit 58ea49b092)
2021-05-14 20:05:56 +00:00
Justin Ibarra 138e410a06 Cleanup note field in rules (#1194)
* standardize usage of note field

(cherry picked from commit 6ef5c53b0c)
2021-05-10 21:41:23 +00:00
Justin Ibarra 82ec6ac1ee Convert windows rules from KQL to EQL (#1114) 2021-04-30 11:21:12 -08:00
Andrew Pease 92eaa5b18a [New Rule] Threat intel indicator match rule (#1133) 2021-04-26 07:07:04 -05:00
Austin Songer 8362578492 [Rule Tuning] AWS IAM Deactivation of MFA Device (#1132)
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
2021-04-23 14:52:54 -04:00
Brent Murphy ff45539369 [Deprecation] Deprecate inherently noisy rules based on testing (#1122)
* Demote maturity
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
2021-04-21 15:10:06 -04:00
Ross Wolf 791c911b9e Merge branch '7.12' into main 2021-04-15 16:17:59 -06:00
Samirbous 0400dc207a [Deprecation] Process Discovery via Tasklist (#1116)
* [Deprecation] Process Discovery via Tasklist

* deprecation_date

* update date

* Update rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
2021-04-15 22:18:56 +02:00