Ross Wolf
f7c154cb8f
[Rule Tuning] Remove \Program Files*\ style wildcards ( #1369 )
...
* Remove \Program Files*\ style wildcards
* Convert string and remote trailing .exe check
* Fix syntax
* Escape dot
* Add missing `and`
* Fix syntax for regex string
* Convert * to .* for regex
(cherry picked from commit 7b62fe296d )
2021-07-22 17:55:50 +00:00
Justin Ibarra
fbc19bebb8
[Rule Tuning] Update EQL rules with lookback < maxspan ( #1362 )
...
* [Rule Tuning] Update EQL rules with lookback < maxspan
* update intervals to be at least interval >= 1/2 maxspan
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
(cherry picked from commit 4aab1278bf )
2021-07-22 17:09:36 +00:00
Ross Wolf
b13c369dab
[Fleet] Track integrations in folder and metadata ( #1372 )
...
* Track integrations in folder and metadata
* Remove duplicate entry
* Update note and tests
Removed changes from:
- rules/cyberark/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml
- rules/cyberark/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml
(selectively cherry picked from commit 1882f4456c )
2021-07-21 21:25:22 +00:00
Ross Wolf
a578a3815c
[Rule Tuning] Convert unusual extension rule to regex ( #1368 )
...
* Convert unusual extension rule to regex
* Update defense_evasion_file_creation_mult_extension.toml
* Fix date
* Fix extension
(cherry picked from commit 9f3d5328f4 )
2021-07-21 17:49:56 +00:00
Ross Wolf
92d432c78b
[Rule Tuning] Creation of Hidden Files and Directories ( #1357 )
...
* [Rule Tuning] Creation of Hidden Files and Directories
* Remove redundant `A` from the regex
(cherry picked from commit 9b559d0cd9 )
2021-07-21 17:48:07 +00:00
David French
b81f29cddf
[Rule Tuning] Update Google Workspace rules to use google_workspace event schema ( #1374 )
...
* use google_workspace event schema
* update to use google_workspace schema
(cherry picked from commit 23626b814c )
2021-07-21 17:39:16 +00:00
dstepanic17
acc15485fa
[New Rule] Windows Defender Exclusions Added via PowerShell ( #1370 )
...
* Added new rule
* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
* Added pwsh.exe to original name
* Added PowerShell MITRE reference
* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/windows/defense_evasion_defender_exclusion_via_powershell.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit fbd4cf2117 )
2021-07-21 16:54:39 +00:00
Austin Songer
34b37c0bfd
[Rule Tuning] Mimikatz powershell module activity detected ( #1297 )
...
* update query
* add indexes
(cherry picked from commit 95e6458c6e )
2021-07-21 07:08:31 +00:00
Andrew Pease
f0514de6a2
[Rule Tuning] Add Filebeat and Auditbeat to Network Rules ( #1282 )
...
* standardized indices and added the from field
(cherry picked from commit 34df7c6b89 )
2021-07-21 06:59:52 +00:00
Austin Songer
f64a9599d0
[New Rule] O365 Excessive SSO Logon Errors ( #1215 )
...
(cherry picked from commit 64c3f7cdc5 )
2021-07-21 06:55:27 +00:00
Austin Songer
47ca92f97a
[New Rule] Disable Windows Event and Security Logs ( #1181 )
...
(cherry picked from commit c82790f588 )
2021-07-21 06:45:03 +00:00
Austin Songer
77b80d7e6d
[Rule Tuning] Suspicious CertUtil Commands ( #1180 )
...
* update name to Suspicious CertUtil Commands
* update description, query, and filename
(cherry picked from commit 4a11ef9514 )
2021-07-21 06:27:05 +00:00
Austin Songer
c6987f2484
[Rule Tuning] External IP Lookup from Non-Browser Process ( #1147 )
...
* Added a couple domains
ipapi.co
ip-lookup.net
ipstack.com
(cherry picked from commit 920d973064 )
2021-07-21 05:48:06 +00:00
Samirbous
f052e81907
[New Rule] Parent Process PID Spoofing ( #1338 )
...
* [New Rule] Parent Process PID Spoofing
* excluding sihost FPs
* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
* relinted and added 2 non ecs fields
* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/windows/defense_evasion_parent_process_pid_spoofing.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 81ab43898c )
2021-07-15 20:56:12 +00:00
Oliver Gupte
fe816747e7
[APM] Adds APM data stream 'traces-apm*' to apm rules ( #105334 ) ( #1335 )
...
(cherry picked from commit 7ec97e622f )
2021-07-13 13:05:31 +00:00
Samirbous
43dd58d11d
[New Rule] Potential PrintNightmare Exploitation rules ( #1326 )
...
* [New Rule] Potential PrintNightmare Exploitation rules
* added Potential PrintNightmare File Modification
* added spoolsv as process name to narrow more the scope
* added Suspicious Print Spooler File Deletion
* removed Suspicious Print Driver Registry Modification cuz of potential noise
* Update privilege_escalation_printspooler_malicious_registry_modification.toml
* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* adjusted description and added a comment for sysmon compatibility
* added FP note and relinted all files
* Update rules/windows/privilege_escalation_printspooler_malicious_driver_file_changes.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
* Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
* Update rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
* Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
* relinted
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
(cherry picked from commit 89420ae976 )
2021-07-07 16:56:55 +00:00
Samirbous
dd24dabb0d
[New Rule] Complementary Rules for Recent REvil TTPs ( #1329 )
...
* [New Rule] Complementary Rules for Recent REvil TTPs
* added OFN
* relinted and added T1574.002
* removed new line
* Update defense_evasion_disabling_windows_defender_powershell.toml
* corrected rule name
* added a reference url
* Update rules/windows/defense_evasion_disabling_windows_defender_powershell.toml
Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com >
* Update rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml
Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com >
* Update rules/windows/defense_evasion_execution_windefend_unusual_path.toml
Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com >
* Update rules/windows/defense_evasion_execution_windefend_unusual_path.toml
Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com >
Co-authored-by: Andrew Pease <7442091+peasead@users.noreply.github.com >
(cherry picked from commit 9fadc4c1dc )
2021-07-07 15:03:09 +00:00
Justin Ibarra
68e7b6bbe3
Make "config" in note field consistent ( #1310 )
...
* Add test to ensure consistent config in note field
* Update inconsistent rule
(cherry picked from commit 63a39665e3 )
2021-07-06 23:54:18 +00:00
Austin Songer
102b9ff7d5
[New Rule] AWS RDS Security Group Created ( #1260 )
...
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: Brent Murphy <bmurphy@endgame.com >
(cherry picked from commit 8e451f2318 )
2021-06-23 00:15:15 +00:00
Austin Songer
6fd6bb1712
[New Rule] AWS RDS Security Group Deleted ( #1261 )
...
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: Brent Murphy <bmurphy@endgame.com >
(cherry picked from commit fe14cd23ed )
2021-06-23 00:09:32 +00:00
Austin Songer
7749086f3b
[New Rule] AWS RDS Instance Creation ( #1269 )
...
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: Brent Murphy <bmurphy@endgame.com >
(cherry picked from commit 9d4574b267 )
2021-06-23 00:03:06 +00:00
Austin Songer
78c75d71b0
[New Rule] AWS RDS Snapshot Export ( #1270 )
...
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: Brent Murphy <bmurphy@endgame.com >
(cherry picked from commit ccae1dc841 )
2021-06-22 23:58:29 +00:00
Austin Songer
4823a40d19
[Rule Tuning] Potential password spraying of microsoft 365 user accounts ( #1164 )
...
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com >
(cherry picked from commit c215c44809 )
2021-06-22 17:36:32 +00:00
Ross Wolf
ba5f3eed82
Switch from process.ppid to process.parent.pid ( #1255 )
...
* Switch from process.ppid to process.parent.pid
* Bump updated date
* Bump updated date
(cherry picked from commit 31f63e728e )
2021-06-22 15:10:59 +00:00
Brent Murphy
549cc9992d
[Rule Tuning] Attempts to Brute Force a Microsoft 365 User Account ( #1251 )
...
* Update credential_access_microsoft_365_brute_force_user_account_attempt.toml
* add authors
(cherry picked from commit d8ef9a81ef )
2021-06-22 14:39:09 +00:00
Brent Murphy
c493c5df67
Update initial_access_smb_windows_file_sharing_activity_to_the_internet.toml ( #1225 )
...
(cherry picked from commit a8c9d7174f )
2021-06-22 14:22:18 +00:00
Austin Songer
74132fbbe9
[New Rule] AWS Route 53 Domain Transferred to Another Account ( #1198 )
...
(cherry picked from commit ea9a23af8d )
2021-06-22 06:09:14 +00:00
Austin Songer
10d22d9477
[New Rule] AWS Route 53 Domain Transfer Lock Disabled ( #1197 )
...
(cherry picked from commit 2cadee1718 )
2021-06-22 06:06:10 +00:00
Austin Songer
b8a3f43b99
[New Rule] EC2 Full Network Packet Capture Detected ( #1175 )
...
(cherry picked from commit d7e0e37e54 )
2021-06-22 06:01:05 +00:00
Austin Songer
3996e94bfd
[New Rule] Azure Service Principal Credentials Added ( #1169 )
...
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
(cherry picked from commit 6986f28af6 )
2021-06-22 05:50:17 +00:00
Justin Ibarra
18765631fb
Fix rules which were note using v2 license ( #1291 )
...
(cherry picked from commit e0fa25ae8e )
2021-06-16 14:21:50 +00:00
Ross Wolf
915c2dea2a
[Bug] Fix ML job IDs that used hyphens ( #1287 )
...
* Fix ML job IDs that used hyphens
* Update ml_high_count_network_denies.toml
* Update ml_spike_in_traffic_to_a_country.toml
* Set updated_date
(cherry picked from commit 49cb2e8dbf )
2021-06-15 17:41:04 +00:00
David French
fb93735c0f
[Rule Tuning] Attempts to Brute Force an Okta User Account ( #1216 )
...
* update rule.threshold field value
* add rule authors
* bump updated_date
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 177cfc85bf )
2021-06-15 16:08:09 +00:00
Apoorva Joshi
cce7c126b6
Updating rules to query v2 ( #1254 )
...
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
(cherry picked from commit 1f7c88c6f4 )
2021-06-15 14:21:09 +00:00
Brent Murphy
683621fe62
[Rule Tuning] Update network rule address blocks ( #1227 )
...
* Update network rule address blocks
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com >
(cherry picked from commit 12577f7380 )
2021-06-15 13:23:16 +00:00
Austin Songer
3d6cefb296
[Rule Tuning] Attempts to brute force a microsoft 365 user account ( #1163 )
...
Update rules/microsoft-365/credential_access_microsoft_365_brute_force_user_account_attempt.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com >
(cherry picked from commit 546e43071c )
2021-06-15 13:20:40 +00:00
Brent Murphy
8b3d085f73
Update persistence_suspicious_com_hijack_registry.toml ( #1244 )
...
(cherry picked from commit 13bf55480a )
2021-06-14 13:00:39 +00:00
Austin Songer
5d41f2719a
[New Rule] AWS EC2 VM Export Failure ( #1142 )
...
* New Rule: AWS EC2 VM Export Failure
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
* Update exfiltration_ec2_vm_export_failure.toml
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com >
(cherry picked from commit 6b45186827 )
2021-06-09 19:03:56 +00:00
Brent Murphy
1eb36b1a9e
[New Rule] Modification of AmsiEnable Registry Key ( #1248 )
...
* Create defense_evasion_amsienable_key_mod.toml
(cherry picked from commit fce022c275 )
2021-06-07 17:21:36 +00:00
Brent Murphy
f91e0facea
Update privilege_escalation_persistence_phantom_dll.toml ( #1228 )
...
(cherry picked from commit 6626cbb943 )
2021-06-01 13:29:25 +00:00
Brent Murphy
f9805954ee
[New Rule] Unusual Network Connection via DllHost ( #1232 )
...
* Create defense_evasion_unusual_network_connection_via_dllhost.toml
* add timestamp override
(cherry picked from commit c457614e37 )
2021-05-28 19:09:26 +00:00
Brent Murphy
acfca54f73
[New Rule] Suspicious Execution from a Mounted Device ( #1230 )
...
* Create defense_evasion_suspicious_execution_from_mounted_device.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 31e8d03438 )
2021-05-28 18:44:24 +00:00
Austin Songer
fcd29373d5
[Rule Tuning] High Number of Okta User Password Reset or Unlock Attempts ( #1200 )
...
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com >
(cherry picked from commit 58ea49b092 )
2021-05-14 20:05:56 +00:00
Justin Ibarra
138e410a06
Cleanup note field in rules ( #1194 )
...
* standardize usage of note field
(cherry picked from commit 6ef5c53b0c )
2021-05-10 21:41:23 +00:00
Justin Ibarra
82ec6ac1ee
Convert windows rules from KQL to EQL ( #1114 )
2021-04-30 11:21:12 -08:00
Andrew Pease
92eaa5b18a
[New Rule] Threat intel indicator match rule ( #1133 )
2021-04-26 07:07:04 -05:00
Austin Songer
8362578492
[Rule Tuning] AWS IAM Deactivation of MFA Device ( #1132 )
...
* Update impact_iam_deactivate_mfa_device.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
2021-04-23 14:52:54 -04:00
Brent Murphy
ff45539369
[Deprecation] Deprecate inherently noisy rules based on testing ( #1122 )
...
* Demote maturity
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com >
2021-04-21 15:10:06 -04:00
Ross Wolf
791c911b9e
Merge branch '7.12' into main
2021-04-15 16:17:59 -06:00
Samirbous
0400dc207a
[Deprecation] Process Discovery via Tasklist ( #1116 )
...
* [Deprecation] Process Discovery via Tasklist
* deprecation_date
* update date
* Update rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com >
2021-04-15 22:18:56 +02:00