Terrance DeJesus
c2bcfc575f
[New Rule] Elastic Agent Stopped ( #1991 )
...
* new rule for detecting if elastic agent has been stopped
* adjusted query based on feedback; added powershell, taskkill, pskill and processhacker
2022-07-18 17:15:01 -04:00
Colson Wilhoit
4235b5d798
[New Rule] Dynamic Linker Copy ( #2099 )
...
* [New Rule] Dynamic Linker Copy
* Update rules/linux/persistence_dynamic_linker_backup.toml
* Update rules/linux/persistence_dynamic_linker_backup.toml
* Update rules/linux/persistence_dynamic_linker_backup.toml
(cherry picked from commit 9995558b2a )
2022-07-13 15:18:44 +00:00
Colson Wilhoit
4913be81e0
[New Rule] Tc BPF Filter ( #2091 )
...
* tc bpf filter
* Update rules/linux/execution_tc_bpf_filter.toml
(cherry picked from commit 58ad0823ca )
2022-07-13 14:42:49 +00:00
Jonhnathan
d8ee4473a2
[Security Content] 8.4 - Add Investigation Guides ( #2069 )
...
* [Security Content] 8.4 - Add Investigation Guides
* Apply suggestions from code review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
* Update rules/windows/credential_access_cmdline_dump_tool.toml
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
* Apply suggestions from code review
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
* Update rules/windows/credential_access_credential_dumping_msbuild.toml
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
Removed changes from:
- rules/windows/execution_command_shell_started_by_svchost.toml
(selectively cherry picked from commit 3a8efc8183 )
2022-07-13 14:29:48 +00:00
Colson Wilhoit
3e73a3c60a
[New Rule] Insmod kernel module load ( #2093 )
...
* insmod kernel module load
* Update rules/linux/persistence_insmod_kernel_module_load.toml
* Update rules/linux/persistence_insmod_kernel_module_load.toml
(cherry picked from commit d7d0466344 )
2022-07-13 14:23:29 +00:00
Terrance DeJesus
e241df5d76
[Rule Tuning] Potential Reverse Shell Activity via Terminal ( #2077 )
...
* adjusted query rule to exclude noisy FPs
* adjusted event.action to be event.type
(cherry picked from commit 7581234fe8 )
2022-07-13 02:34:43 +00:00
Mika Ayenson
06ce0015df
Add new required_fields as a build-time restricted field ( #2059 )
...
* Add new `require_field` restricted field
* validate new fields against BaseRuleData schema and global constant
Co-authored-by: Terrance DeJesus <terrance.dejesus@elastic.co >
Co-authored-by: brokensound77 <brokensound77@users.noreply.github.com >
(cherry picked from commit c76a397969 )
2022-07-06 15:51:18 +00:00
Terrance DeJesus
de2a90090c
[New Rule] Domain Trust Enumeration via Nltest ( #2010 )
...
* adding detection rule
* removed changes from unrelated rule
* adjusted threat technique
* Update rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml
* Update rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
* Update rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
* Update rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 329530c8c3 )
2022-07-05 14:49:39 +00:00
Janeen Mikell-Straughn
45e804f3e5
Fixing doc bugs reported by QA. ( #2065 )
...
Co-authored-by: Craig Chamberlain <randomuserid@users.noreply.github.com >
(cherry picked from commit 13c63ceaef )
2022-06-30 20:00:58 +00:00
Jonhnathan
8011420e71
Update discovery_privileged_localgroup_membership.toml ( #2046 )
...
(cherry picked from commit 853f8db8d0 )
2022-06-30 17:27:15 +00:00
Craig Chamberlain
b47e763949
user risk score docs ( #2055 )
...
* user risk score
initial create of user risk score docs
* add paragraph
adding another paragraph for explainabiltiy as suggested by pm
* Update docs/experimental-machine-learning/readme.md
Co-authored-by: Apoorva Joshi <30438249+ajosh0504@users.noreply.github.com >
* Update user-risk-score.md
fixes and suggestions
* Update user-risk-score.md
rm int script reference
* Update docs/experimental-machine-learning/user-risk-score.md
Co-authored-by: Apoorva Joshi <30438249+ajosh0504@users.noreply.github.com >
* Update user-risk-score.md
* Update user-risk-score.md
* Update user-risk-score.md
Co-authored-by: Apoorva Joshi <30438249+ajosh0504@users.noreply.github.com >
(cherry picked from commit 1bb2273c0c )
2022-06-28 15:53:56 +00:00
Mika Ayenson
cf952854d6
test automatically prevent future merges when a backport fails ( #1909 )
...
automatically prevent future merges when a backport fails
2022-06-27 11:31:49 -04:00
Justin Ibarra
179a3bd284
Add support for restricted fields ( #2053 )
...
* Add support for restricted fields (fields valid only in min/max stack versions)
* add test to ensure rule backports wont exceed min compat
(cherry picked from commit cc01d3fb1a )
2022-06-27 15:03:32 +00:00
Mika Ayenson
eb6deea9ac
Update cli documentation for search-alerts ( #2051 )
...
* Add cli documentation for search-alerts and table fields
(cherry picked from commit 4ef1a1a627 )
2022-06-24 14:00:01 +00:00
Mika Ayenson
6c5e101e6f
test automatically prevent future merges when a backport fails ( #1909 )
...
automatically prevent future merges when a backport fails
(cherry picked from commit 4fdd978183 )
2022-06-23 19:00:24 +00:00
github-actions[bot]
fafe1e0ab6
Locked versions for releases: 7.16,8.0,8.1,8.2,8.3 ( #2041 )
...
Co-authored-by: terrancedejesus <terrancedejesus@users.noreply.github.com >
(cherry picked from commit fd9c9f8abf )
2022-06-17 15:44:35 +00:00
shashank-elastic
69237c4ed2
[Rule tuning] existing strace activity rule. ( #2028 )
...
* Update description and MITTRE Attack details
(cherry picked from commit 2ee23bd80f )
2022-06-16 11:49:16 +00:00
Jonhnathan
0973ac07ef
Update discovery_remote_system_discovery_commands_windows.toml ( #2033 )
...
(cherry picked from commit c8ff1dc9cb )
2022-06-14 13:52:02 +00:00
Isai
fa5fc6094e
[New Rule] Kubernetes execution_user_exec_to_pod ( #1979 )
...
* Create execution_user_exec_to_pod.toml
* Update execution_user_exec_to_pod.toml
* Update rules/integrations/kubernetes/execution_user_exec_to_pod.toml
* Update non-ecs-schema.json
* Update execution_user_exec_to_pod.toml
* Update rules/integrations/kubernetes/execution_user_exec_to_pod.toml
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
* Update execution_user_exec_to_pod.toml
* Update execution_user_exec_to_pod.toml
* Update execution_user_exec_to_pod.toml
* toml-linted file and add to false positive
toml-linted the file and added to the false positive description
* Create notepad.sct
Added this back into the repo, deleted by mistake.
* added min_stack_version based on integration
min stack version determined by integration support of necessary fields
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 63fda01fdd )
2022-06-09 21:53:15 +00:00
Justin Ibarra
8564185a7d
[Bug] resolves bug in Rule version methods ( #2021 )
...
* [Bug] resolves bug in Rule version methods
* comment out unused code with notes
(cherry picked from commit 744f56d98e )
2022-06-07 23:41:40 +00:00
Jonhnathan
57194b8e59
[Rule Tuning] M365 - Remove event.outcome condition from Auth Events ( #2004 )
...
* Remove event.outcome condition
* Update credential_access_microsoft_365_brute_force_user_account_attempt.toml
* Revert "Update credential_access_microsoft_365_brute_force_user_account_attempt.toml"
This reverts commit c7e7c976174a62e6b50139291e8f7f1a34e7beab.
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 3aa53fc6c5 )
2022-06-03 17:24:48 +00:00
Jonhnathan
835b342a43
Update persistence_sdprop_exclusion_dsheuristics.toml ( #2017 )
...
(cherry picked from commit b6631f200e )
2022-06-03 17:22:33 +00:00
Jonhnathan
a51d251e05
Adds logs-system.* index pattern ( #2016 )
...
(cherry picked from commit f857e009c5 )
2022-06-03 16:57:26 +00:00
Justin Ibarra
c16442517e
[Bug] Fix test_matrix_to_lock_version_defaults test ( #2014 )
...
(cherry picked from commit e850f39526 )
2022-06-03 00:35:19 +00:00
Justin Ibarra
3a1a5fe12b
Collapse unsupported previous version entries ( #2013 )
...
* Collapse unsupported previous version entries
* drop the last entry in the matrix test
(cherry picked from commit f57950a3c9 )
2022-06-02 23:18:45 +00:00
Terrance DeJesus
220996b1b8
Prep for Creation of 8.4 Branch ( #2001 )
...
* prepping for 8.4 branch
* adjusted schemas init file
* adjusted target matrix to only backport to 7.16, updated api schemas
* adjusted the lock-versions workflow to account for 7.16 and up support only
* Add test for version lock to schema map correlation
* decouple from static 7.13 references
* keep patch version for lock
* Update detection_rules/etc/packages.yml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
Co-authored-by: brokensound77 <brokensound77@users.noreply.github.com >
Removed changes from:
- detection_rules/etc/packages.yml
(selectively cherry picked from commit 35b1a69ff5 )
2022-06-02 18:59:56 +00:00
shashank-elastic
b12d1cb978
[Rule Tuning] Add MITRE Details to exisisting hpining activity rule. ( #2012 )
...
* Add MITRE Details to existing hping activity rule.
(cherry picked from commit f02325fe2f )
2022-06-02 05:08:23 +00:00
shashank-elastic
821e04aaf8
Linux binary(s) ftp shell evasion threat ( #2007 )
...
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 98a85ddcee )
2022-06-01 16:40:06 +00:00
Samirbous
29cf0c8f77
[New Rule] Suspicious Microsoft Diagnostics Wizard Execution ( #2005 )
...
* [New Rule] Suspicious Microsoft Diagnostics Wizard Execution
https://lolbas-project.github.io/lolbas/Binaries/Msdt/
https://twitter.com/nao_sec/status/1530196847679401984
* Update rules/windows/defense_evasion_proxy_execution_via_msdt.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
(cherry picked from commit d6e96a83d5 )
2022-06-01 15:04:54 +00:00
Jonhnathan
1484c20795
[Security Content] 8.3 Add Investigation Guides - 3 ( #1990 )
...
* [Security Content] 8.3 Add Investigation Guides - 3
* bump date
* Apply suggestions from code review
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
* Apply suggestions from code review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
(cherry picked from commit 27f5c2e695 )
2022-05-31 15:59:13 +00:00
Jonhnathan
d575fd4b3c
[Security Content] 8.3 - Add Investigation Guides 2 ( #1989 )
...
* [Security Content] 8.3 - Add Investigation Guides 2 - Initial Commit
* .
* Add Related rules
* Apply suggestions from code review
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
* Apply suggestions from code review
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
* .
* .
* Apply suggestions from code review
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
Co-authored-by: Joe Peeples <joe.peeples@elastic.co >
(cherry picked from commit e5d3c6329c )
2022-05-31 15:56:50 +00:00
Samirbous
10c2d9de3d
[Rule Tuning] Suspicious MS Office Child Process ( #2003 )
...
added msdt.exe as a response to this in the wild 0day (works without vba and on latest office) ->
https://twitter.com/nao_sec/status/1530196847679401984
https://www.virustotal.com/gui/file/4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784/detection
(cherry picked from commit bfea11c99f )
2022-05-31 12:23:08 +00:00
Jonhnathan
1d69a2bbae
[Promote Rule] Potential Invoke-Mimikatz PowerShell Script ( #1993 )
...
* Update credential_access_mimikatz_powershell_module.toml
* Update credential_access_mimikatz_powershell_module.toml
* Update credential_access_mimikatz_powershell_module.toml
* Update credential_access_mimikatz_powershell_module.toml
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
(cherry picked from commit 1f8813d02f )
2022-05-25 20:04:28 +00:00
Justin Ibarra
6199bd4524
Refresh ECS/beats schemas up to 8.2 ( #1995 )
...
(cherry picked from commit 0428e161a8 )
2022-05-25 19:53:52 +00:00
Mika Ayenson
3988b2ed5e
Skip previous validation on pre/post load/dump ( #1942 )
...
* Build out the dataclasses for a base entry and version lock explicitly
* Ensure previous field does not have a nested previous
* Test validation on version lock for previous fields.
(cherry picked from commit e1266a6fd3 )
2022-05-25 17:36:12 +00:00
shashank-elastic
75f8928d1f
[Rule tuning] Linux binary(s) shell evasion threat
...
* Linux binary(s) git shell evasion threat
(cherry picked from commit fd7a6d63b0 )
2022-05-25 13:53:22 +00:00
shashank-elastic
44046642e7
[Rule tuning] Linux binary(s) shell evasion threat ( #1957 )
...
* Linux binary(s) shell evasion threat
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
(cherry picked from commit 51b2d9da4b )
2022-05-25 03:04:53 +00:00
Justin Ibarra
c5e3312727
[Rule tuning] Whitespace Padding in Process Command Line ( #1967 )
...
* [Rule tuning] Whitespace Padding in Process Command Line
* bump updated_date
* update comment
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 72c186b30b )
2022-05-23 19:35:44 +00:00
Justin Ibarra
0796082300
[Rule tuning] Unusual Process Execution - Temp ( #1968 )
...
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
(cherry picked from commit 1840a638c8 )
2022-05-23 15:06:55 +00:00
Bobby Filar
e57cf31867
Modifying rules assoc w/ deprecation of v2 ML jobs ( #1846 )
...
* modifying rules assoc w/ deprecation of v2 ML jobs
* modified updated_date field
* fixed machine_learning_job_id and added min_stack_version
* replacing rest of deprecated jobs with new naming convention
* Update ml_suspicious_login_activity.toml
* removing rules assoc w/ deprecated ML jobs
* Update rules/ml/ml_linux_anomalous_compiler_activity.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/ml/ml_linux_anomalous_compiler_activity.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* updated ml job rules to reflect 8.3 changes
* updating min_stack_version for ml detection rules
Co-authored-by: Craig Chamberlain <randomuserid@users.noreply.github.com >
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
Co-authored-by: Apoorva Joshi <30438249+ajosh0504@users.noreply.github.com >
Removed changes from:
- rules/ml/ml_linux_anomalous_compiler_activity.toml
- rules/ml/ml_linux_anomalous_metadata_process.toml
- rules/ml/ml_linux_anomalous_metadata_user.toml
- rules/ml/ml_linux_anomalous_network_activity.toml
- rules/ml/ml_linux_anomalous_network_port_activity.toml
- rules/ml/ml_linux_anomalous_process_all_hosts.toml
- rules/ml/ml_linux_anomalous_sudo_activity.toml
- rules/ml/ml_linux_anomalous_user_name.toml
- rules/ml/ml_linux_system_information_discovery.toml
- rules/ml/ml_linux_system_network_configuration_discovery.toml
- rules/ml/ml_linux_system_network_connection_discovery.toml
- rules/ml/ml_linux_system_process_discovery.toml
- rules/ml/ml_linux_system_user_discovery.toml
- rules/ml/ml_rare_process_by_host_linux.toml
- rules/ml/ml_rare_process_by_host_windows.toml
- rules/ml/ml_suspicious_login_activity.toml
- rules/ml/ml_windows_anomalous_metadata_process.toml
- rules/ml/ml_windows_anomalous_metadata_user.toml
- rules/ml/ml_windows_anomalous_network_activity.toml
- rules/ml/ml_windows_anomalous_path_activity.toml
- rules/ml/ml_windows_anomalous_process_all_hosts.toml
- rules/ml/ml_windows_anomalous_process_creation.toml
- rules/ml/ml_windows_anomalous_script.toml
- rules/ml/ml_windows_anomalous_service.toml
- rules/ml/ml_windows_anomalous_user_name.toml
- rules/ml/ml_windows_rare_user_runas_event.toml
- rules/ml/ml_windows_rare_user_type10_remote_login.toml
(selectively cherry picked from commit 9a739b7e4c )
2022-05-20 20:04:28 +00:00
Mika Ayenson
a2dbfff31b
[Rule tuning] add support for osx, zsh, and expand tampering techniques ( #1974 )
...
* add support for osx, zsh, and expand tampering techniques
* migrate to cross-platform and add macOS tag
(cherry picked from commit 77966473d1 )
2022-05-20 15:12:56 +00:00
Jonhnathan
18277206f8
[Security Content] 8.3 - Add Investigation Guides ( #1937 )
...
* 8.3 - Add Investigation Guides
* Apply suggestions
* Apply the refactor
* Apply suggestions from Samir
* .
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit a1bdf2b564 )
2022-05-19 16:25:46 +00:00
Mika Ayenson
128053a93e
[Rule tuning] check for anything found in the emondClient directory ( #1977 )
...
* check for anything found in the emondClient directory and add reference
(cherry picked from commit 92640f517a )
2022-05-18 16:35:25 +00:00
Jonhnathan
7c90f1d4c4
[Security Content] Refactor Existing Investigation Guides ( #1959 )
...
* Initial commit
* Update Investigation guides - security-docs review
* Update command_and_control_dns_tunneling_nslookup.toml
* Update defense_evasion_amsienable_key_mod.toml
* Apply security-docs review
* Remove dot
* Update rules/windows/command_and_control_rdp_tunnel_plink.toml
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
* Apply changes from review
* Apply the suggestion
Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com >
(cherry picked from commit 817b97f428 )
2022-05-18 16:01:50 +00:00
Colson Wilhoit
4817bf26c8
[Rule Tuning] Update Rule Name: Suspicious Network Connection Attempt Sequence by Root ( #1983 )
...
* [Rule Tuning] Update Rule Name
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
(cherry picked from commit d12f45c6ba )
2022-05-17 22:43:06 +00:00
Terrance DeJesus
a440d87f67
[New Rule] Suspicious Outbound Network Connect Sequence by Root ( #1975 )
...
* adding initial rule
* adjusted UUID
* removed event.ingested as query is a sequence
* changed file name to match mitre ATT&CK tactic
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* TOML linted
* Update command_and_control_connection_attempt_by_non_ssh_root_session.toml
Just edited a couple grammar things. Looks good
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* Update rules/linux/command_and_control_connection_attempt_by_non_ssh_root_session.toml
* added additional tactic for privilege escalation and linted
* formatted query to be more readable
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: Isai <59296946+imays11@users.noreply.github.com >
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
(cherry picked from commit c89f423961 )
2022-05-16 21:24:34 +00:00
Jonhnathan
f223e63030
Update command_and_control_common_webservices.toml ( #1970 )
...
(cherry picked from commit 27e6632ecd )
2022-05-16 17:06:24 +00:00
Terrance DeJesus
c7d1ea428c
[New Rule] Abnormal Process ID File Creation ( #1964 )
...
* adding rule detection
* changed Rule ID
* Update rules/linux/execution_abnormal_process_id_file_created.toml
Adding reboot extension as well.
Reference: https://exatrack.com/public/Tricephalic_Hellkeeper.pdf
* Update rules/linux/execution_abnormal_process_id_file_created.toml
Adding reboot to description.
Reference: https://exatrack.com/public/Tricephalic_Hellkeeper.pdf
* Update rules/linux/execution_abnormal_process_id_file_created.toml
Added additional reference to similar threat.
* Update rules/linux/execution_abnormal_process_id_file_created.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* Update rules/linux/execution_abnormal_process_id_file_created.toml
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
* added rule for a process starting where the executable's name represented a PID file
* Adjusted user.id value from integer to string
* Added simple investigation notes and osquery coverage
* TOML linting
* Updated date to reflect recent changes
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com >
(cherry picked from commit 1704924f7b )
2022-05-12 14:40:34 +00:00
Samirbous
ca7a148f5a
[New rule] Remote Computer Account DnsHostName Update ( #1962 )
...
* [New rule] Remote Computer Account DnsHostName Update
Identifies remote update to a computer account DnsHostName attribute, if the new value is set a valid domain controller DNS hostname and the subject computer name is not a domain controller then it's high likely a preparation step to exploit CVE-2022-26923 in an attempt to elevate privileges from a standard domain user to domain admin privileges :
* added MS ref url
* Update rules/windows/privilege_escalation_suspicious_dnshostname_update.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
* Update rules/windows/privilege_escalation_suspicious_dnshostname_update.toml
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com >
(cherry picked from commit 19ff825a91 )
2022-05-11 17:42:44 +00:00
Terrance DeJesus
b5f473a444
[New Rule] Executable Launched from Shared Memory Directory ( #1961 )
...
* new rule to check for executables launched from shared memory directory
* added references and false positive instances
* Update rules/linux/execution_shared_memory_executable.toml
* Update rules/linux/execution_shared_memory_executable.toml
* Update rules/linux/execution_shared_memory_executable.toml
* adjusted process to account for var run and lock directories
* TOML lint and query formatting
* TOML lint and query formatting
* Update rules/linux/execution_process_started_in_shared_memory_directory.toml
* Update rules/linux/execution_process_started_in_shared_memory_directory.toml
* Update rules/linux/execution_process_started_in_shared_memory_directory.toml
* Update rules/linux/execution_process_started_in_shared_memory_directory.toml
* added BPFDoor tag to be threat specific
* TOML linting and adjusted risk because of root requirement
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
(cherry picked from commit 5f447a63a2 )
2022-05-11 16:22:41 +00:00