Jonhnathan
ad880bb7df
[Rule Tuning] Standardizing Risk Score according to Severity ( #2242 )
...
(cherry picked from commit 6e2d20362a )
2022-08-22 01:30:44 +00:00
Samirbous
353fde10a0
[Deprecate Rule] Suspicious Process from Conhost ( #2222 )
...
only FPs with no way to tune other than opening the rule for easy evasion by excluding by process.executable/args).
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit d3420e3386 )
2022-08-16 14:33:36 +00:00
Samirbous
73834a3b08
[Rule Tuning] Whoami Process Activity ( #2224 )
...
* added Whoami Process Activity
* Update discovery_whoami_command_activity.toml
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 8e0ae64a04 )
2022-08-16 14:27:06 +00:00
Samirbous
0a6f9c6ddf
[Rule Tuning] Suspicious Execution via Scheduled Task ( #2235 )
...
Excluding`?:\\ProgramData` and few other noisy FP pattern by process.args + name to reduce users alert fatigue.
(cherry picked from commit 0f7b29918c )
2022-08-15 19:51:18 +00:00
Samirbous
96fd9f86a2
[Rule Tuning] Reduce FPs ( #2223 )
...
9 rules tuned to exclude common noisy FP patterns.
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Removed changes from:
- rules/windows/execution_command_shell_started_by_svchost.toml
(selectively cherry picked from commit b89d6185b2 )
2022-08-15 14:16:46 +00:00
Jonhnathan
9dabc6fc79
[Security Content] 8.4 - Add Investigation Guides - Windows - 2 ( #2144 )
...
* [Security Content] 8.4 - Add Investigation Guides - Windows - 2
* update date
* Apply suggestions from review
* Apply suggestions from code review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
(cherry picked from commit fc7a384d19 )
2022-08-09 00:35:02 +00:00
Mika Ayenson
7b0662289e
[Rule Tuning] Persistence via Folder Action Script ( #2174 )
...
* Exclude FPs for iterm
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit d1bc53e295 )
2022-08-05 18:37:02 +00:00
Mika Ayenson
9af8fb5ba4
[Rule Tuning] Potential Persistence via Login Hook ( #2177 )
...
* Exclude FPs for iMazing Profile Editor and backupd
(cherry picked from commit 4f55e9b05f )
2022-08-05 18:26:31 +00:00
Mika Ayenson
39ad3ba652
[Rule Tuning] Sublime Plugin or Application Script Modification ( #2180 )
...
* expand filter to sublime text contents
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 058f11f650 )
2022-08-05 18:16:34 +00:00
TotalKnob
c585aed3e2
Remove ambiguity from impact_modification_of_boot_config.toml ( #2199 )
...
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
(cherry picked from commit b043695833 )
2022-08-05 13:39:39 +00:00
Terrance DeJesus
8bddaa5225
[Deprecation rule] DNS Activity to the Internet ( #2221 )
...
(cherry picked from commit a76c51ae17 )
2022-08-03 02:01:16 +00:00
Mika Ayenson
18295488fc
[Rule Tuning] Execution with Explicit Credentials via Scripting ( #2190 )
...
* add case sensitive Python process name and T1548
(cherry picked from commit ecd10b672a )
2022-08-02 18:21:59 +00:00
Mika Ayenson
45a5981598
[Rule Tuning] Suspicious Calendar File Modification ( #2187 )
...
* exclude fps for Mail.app
(cherry picked from commit d8e0c0fee3 )
2022-08-02 18:08:24 +00:00
Samirbous
979ca1dfab
[Rules Tuning] Add support for Sysmon ImageLoad Events ( #2215 )
...
* [Rules Tuning] Add support for Sysmon ImageLoad Events
added correct event.category and event.action to rules using library events to support sysmon eventid 7.
`event.category == "library"` --> `(event.category == "process" and event.action : "Image loaded*")`
`dll.name` --> `file.name`
* added Suspicious RDP ActiveX Client Loaded
* Delete workspace.xml
(cherry picked from commit 50bb821708 )
2022-08-02 16:41:40 +00:00
Samirbous
ad1e7fbde9
[Rules Tuning] Diverse Windows Rules - FPs reduction ( #2213 )
...
* [Rules Tuning] 7 diverse Windows rules
Excluding FP patterns while avoiding breaking compat with winlogbeat and 4688 events lack of codesign metadata.
* Update initial_access_suspicious_ms_exchange_process.toml
* Update privilege_escalation_persistence_phantom_dll.toml
* Update execution_psexec_lateral_movement_command.toml
* Update persistence_remote_password_reset.toml
* Update non-ecs-schema.json
* Update persistence_remote_password_reset.toml
* Update non-ecs-schema.json
* Update discovery_privileged_localgroup_membership.toml
Removed changes from:
- rules/windows/credential_access_lsass_memdump_file_created.toml
(selectively cherry picked from commit b15f0de9a4 )
2022-08-02 16:38:59 +00:00
Samirbous
7585d6264d
[Deprecate rule] Whitespace Padding in Process Command Line ( #2218 )
...
very noisy and will require frequent tuning with very low TP rate.
(cherry picked from commit a046dc0d29 )
2022-08-02 16:32:01 +00:00
Samirbous
08f2e9003f
[Deprecate Rule] File and Directory Discovery ( #2217 )
...
* [Deprecate Rule] File and Directory Discovery
very noisy and most if not all are FPs, few rooms for tuning without rendering the rule easy to bypass.
* Delete workspace.xml
(cherry picked from commit e5ee8e024f )
2022-08-02 15:58:37 +00:00
shashank-elastic
72fc1e4231
Rule tuning as part of Linux Detection Rules Review ( #2210 )
...
(cherry picked from commit 19d9a7eb87 )
2022-08-02 12:17:59 +00:00
Samirbous
8126bde72c
[Rule Tuning] Suspicious Process Creation CallTrace ( #2207 )
...
Excluding some FPs by process.parent.executable and process.parent.args.
(cherry picked from commit 04dcf09c03 )
2022-08-01 17:01:08 +00:00
Samirbous
777584bbc2
[Rule Tuning] Unusual Service Host Child Process - Childless Service ( #2208 )
...
Excluding some noisy unique processes.
(cherry picked from commit 1f21c5c57f )
2022-08-01 16:41:46 +00:00
Samirbous
2fe7336f2b
[Deprecated Rule] Potential Privilege Escalation via Local Kerberos R… ( #2209 )
...
* [Deprecated Rule] Potential Privilege Escalation via Local Kerberos Relay over LDAP
FPs in certain cases with no room for tuning.
* Update privilege_escalation_krbrelayup_suspicious_logon.toml
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 8d34416049 )
2022-08-01 16:29:46 +00:00
Samirbous
84121d910e
[Rule Tuning] Suspicious Process Access via Direct System Call ( #2204 )
...
Excluding some FPs by calltrace.
(cherry picked from commit a22fef8723 )
2022-08-01 16:17:07 +00:00
Samirbous
ccad691b30
[Rule Tuning] Remotely Started Services via RPC ( #2211 )
...
* [Rule Tuning] Remotely Started Services via RPC
excluding noisy FPs by process.executable to be compatible with winlog and endpoint
* Update lateral_movement_remote_services.toml
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 6f69695820 )
2022-08-01 16:12:14 +00:00
Samirbous
38e9b64fd6
[Rule Tuning] Process Termination followed by Deletion ( #2206 )
...
Excluded some FPs by process.executable and file.path.
(cherry picked from commit 91896db453 )
2022-08-01 16:02:39 +00:00
Samirbous
475d67f1e8
[Rule Tuning] Potential Remote Credential Access via Registry ( #2203 )
...
* [Rule Tuning] Potential Remote Credential Access via Registry
Excluding some noisy FPs by file.path (user and machine hives std paths) and event.action (scoped to logged-in)
* Update credential_access_remote_sam_secretsdump.toml
(cherry picked from commit 049fbf7979 )
2022-08-01 15:50:38 +00:00
Samirbous
0dfae46dcc
[Rule Tuning] Kerberos Traffic from Unusual Process ( #2202 )
...
Excluding couple of FPs by process.executables to reduce FPs rate.
(cherry picked from commit 527507835f )
2022-07-29 20:28:55 +00:00
Isai
5b183e66fa
[Rule Tuning] Persistence via Update Orchestrator Service Hijack ( #2195 )
...
* [Rule Tuning] Persistence via Update Orchestrator Service Hijack
I changed the query to exclude FPs for safe executables found in telemetry: MoUsoCoreWorker.exe and OfficeC2RClient.exe. Changed the query type to KQL to account for the wildcard needed to capture 2 of the executable paths found in telemetry. I'm open to changing back to eql with suggestions.
* Update persistence_via_update_orchestrator_service_hijack.toml
revert back to eql
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 386a8202c0 )
2022-07-29 20:12:27 +00:00
Samirbous
044b5a2c61
[Rule Tuning] Modification of WDigest Security Provider ( #2201 )
...
excluding svchost.exe running as system (main src of FPs for this use case).
(cherry picked from commit 6d61a68c29 )
2022-07-29 17:46:25 +00:00
shashank-elastic
6dfbcb61eb
Rule(s) to identify potential mining activities ( #2185 )
...
(cherry picked from commit b2b5c170dd )
2022-07-29 17:31:28 +00:00
shashank-elastic
40529e9150
Rule tuning as part of Linux Detection Rules Review ( #2170 )
...
(cherry picked from commit 8afded11e7 )
2022-07-29 16:26:57 +00:00
Colson Wilhoit
fcf7a23401
[Rule Tuning] MacOS Installer Package Net Event ( #2193 )
...
* [Rule Tuning] MacOS Installer Package Net Event
* Update rules/macos/execution_installer_package_spawned_network_event.toml
* Update rules/macos/execution_installer_package_spawned_network_event.toml
* Update execution_installer_package_spawned_network_event.toml
just deleting a typo
Co-authored-by: Isai <59296946+imays11@users.noreply.github.com >
(cherry picked from commit 998afcf9c4 )
2022-07-28 20:17:14 +00:00
Mika Ayenson
b67ffd413a
[Rule Tuning] Unexpected Child Process of macOS Screensaver Engine ( #2184 )
...
* add screensaver subtechnique
(cherry picked from commit 3a557503d1 )
2022-07-27 18:50:26 +00:00
Jonhnathan
7a2d7237b6
[Security Content] Add Investigation Guides - Cloud - 3 ( #2132 )
...
* [Security Content] Add Investigation Guides - Cloud - 3
* Apply suggestions from code review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
* Update rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml
* update dates
* Apply suggestions from review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Removed changes from:
- rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml
(selectively cherry picked from commit 91c00fd442 )
2022-07-27 18:41:05 +00:00
Mika Ayenson
6a7b78f14c
[Rule Tuning] Potential Microsoft Office Sandbox Evasion ( #2123 )
...
* filter run by macOS os type
(cherry picked from commit df670fac56 )
2022-07-27 15:59:43 +00:00
Mika Ayenson
4534f04c0c
fix typo in description ( #2168 )
...
(cherry picked from commit fcc9cc9d8e )
2022-07-27 12:52:56 +00:00
Mika Ayenson
e11739383d
[Rule Tuning] Authorization Plugin Modification ( #2156 )
...
* exclude files altered by shove processes
(cherry picked from commit cdafe17ffb )
2022-07-27 12:35:20 +00:00
Mika Ayenson
1fdfadbb7e
[Rule Tuning] LaunchDaemon Creation or Modification and Immediate Loading ( #2154 )
...
* update query
(cherry picked from commit e6bab063dc )
2022-07-27 12:26:06 +00:00
shashank-elastic
8d4606d0dc
Rule(s) deprecation as part of Linux Detection Rule Review ( #2163 )
...
(cherry picked from commit e9267e544c )
2022-07-26 13:19:25 +00:00
Colson Wilhoit
883607488a
[New Rule] File made Immutable by Chattr ( #2161 )
...
* [New Rule] File made Immutable by Chattr
* Update rules/linux/defense_evasion_chattr_immutable_file.toml
(cherry picked from commit c222d4528d )
2022-07-25 18:12:55 +00:00
Colson Wilhoit
a138a1f2a2
[New Rule] Chkconfig Service Add ( #2159 )
...
* [New Rule] Chkconfig Service Add
* Update rules/linux/persistence_chkconfig_service_add.toml
(cherry picked from commit 146f59f4bd )
2022-07-25 16:44:01 +00:00
Mika Ayenson
a06662f91a
filter Bitdefender FPs ( #2109 )
...
(cherry picked from commit b44714c83f )
2022-07-25 14:13:36 +00:00
Colson Wilhoit
d988fcb0de
[New Rule] Suspcious Etc File Creation ( #2160 )
...
* [New Rule] Suspcious Etc File Creation
* Update rules/linux/persistence_etc_file_creation.toml
* Update MITRE syntax
* Update rules/linux/persistence_etc_file_creation.toml
* Update rules/linux/persistence_etc_file_creation.toml
* Update rules/linux/persistence_etc_file_creation.toml
(cherry picked from commit 1746897359 )
2022-07-25 13:49:28 +00:00
Mika Ayenson
cbfa323c34
[Rule Tuning] Attempt to Unload Elastic Endpoint Security Kernel Extension ( #2134 )
...
* add subtechnique T1547/006/
(cherry picked from commit 286941cb8e )
2022-07-23 15:23:38 +00:00
Mika Ayenson
f8a53b50b7
add CVE to tag ( #2127 )
...
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 1dc0fcec47 )
2022-07-23 00:45:21 +00:00
Mika Ayenson
cf1cdb1791
update description ( #2149 )
...
(cherry picked from commit f07c72254d )
2022-07-22 21:13:40 +00:00
Mika Ayenson
2a160e0106
[Rule Tuning] Remote SSH Login Enabled via systemsetup Command ( #2147 )
...
* exclude jamf fp and add ssh subtechnique
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
(cherry picked from commit b3334941f9 )
2022-07-22 21:11:14 +00:00
Mika Ayenson
53e035a91f
exclude google drive FP ( #2145 )
...
(cherry picked from commit 84104773a6 )
2022-07-22 21:01:10 +00:00
Mika Ayenson
5e21144896
[Rule Tuning] Suspicious Automator Workflows Execution ( #2142 )
...
* add subtechnique
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
(cherry picked from commit 44ae72d054 )
2022-07-22 20:51:44 +00:00
Mika Ayenson
f6ed0dcf7e
update tags to include C2 tactic ( #2140 )
...
(cherry picked from commit f176b5ef57 )
2022-07-22 20:40:24 +00:00
Colson Wilhoit
3be3902038
[Rule Tuning] Remove File Quarantine Attribute ( #2129 )
...
(cherry picked from commit d6527afd51 )
2022-07-22 20:26:08 +00:00