Commit Graph

121 Commits

Author SHA1 Message Date
Terrance DeJesus 8bddaa5225 [Deprecation rule] DNS Activity to the Internet (#2221)
(cherry picked from commit a76c51ae17)
2022-08-03 02:01:16 +00:00
Mika Ayenson 18295488fc [Rule Tuning] Execution with Explicit Credentials via Scripting (#2190)
* add case sensitive Python process name and T1548

(cherry picked from commit ecd10b672a)
2022-08-02 18:21:59 +00:00
Mika Ayenson 45a5981598 [Rule Tuning] Suspicious Calendar File Modification (#2187)
* exclude fps for Mail.app

(cherry picked from commit d8e0c0fee3)
2022-08-02 18:08:24 +00:00
Samirbous 979ca1dfab [Rules Tuning] Add support for Sysmon ImageLoad Events (#2215)
* [Rules Tuning] Add support for Sysmon ImageLoad Events

added correct event.category and event.action to rules using library events to support sysmon eventid 7.

`event.category == "library"` --> `(event.category == "process" and event.action : "Image loaded*")`

`dll.name` --> `file.name`

* added Suspicious RDP ActiveX Client Loaded

* Delete workspace.xml

(cherry picked from commit 50bb821708)
2022-08-02 16:41:40 +00:00
Samirbous ad1e7fbde9 [Rules Tuning] Diverse Windows Rules - FPs reduction (#2213)
* [Rules Tuning] 7 diverse Windows rules

Excluding FP patterns while avoiding breaking compat with winlogbeat and 4688 events lack of codesign metadata.

* Update initial_access_suspicious_ms_exchange_process.toml

* Update privilege_escalation_persistence_phantom_dll.toml

* Update execution_psexec_lateral_movement_command.toml

* Update persistence_remote_password_reset.toml

* Update non-ecs-schema.json

* Update persistence_remote_password_reset.toml

* Update non-ecs-schema.json

* Update discovery_privileged_localgroup_membership.toml

Removed changes from:
- rules/windows/credential_access_lsass_memdump_file_created.toml

(selectively cherry picked from commit b15f0de9a4)
2022-08-02 16:38:59 +00:00
Samirbous 7585d6264d [Deprecate rule] Whitespace Padding in Process Command Line (#2218)
very noisy and will require frequent tuning with very low TP rate.

(cherry picked from commit a046dc0d29)
2022-08-02 16:32:01 +00:00
Samirbous 08f2e9003f [Deprecate Rule] File and Directory Discovery (#2217)
* [Deprecate Rule] File and Directory Discovery

very noisy and most if not all are FPs, few rooms for tuning without rendering the rule easy to bypass.

* Delete workspace.xml

(cherry picked from commit e5ee8e024f)
2022-08-02 15:58:37 +00:00
shashank-elastic 72fc1e4231 Rule tuning as part of Linux Detection Rules Review (#2210)
(cherry picked from commit 19d9a7eb87)
2022-08-02 12:17:59 +00:00
Samirbous 8126bde72c [Rule Tuning] Suspicious Process Creation CallTrace (#2207)
Excluding some FPs by process.parent.executable and process.parent.args.

(cherry picked from commit 04dcf09c03)
2022-08-01 17:01:08 +00:00
Samirbous 777584bbc2 [Rule Tuning] Unusual Service Host Child Process - Childless Service (#2208)
Excluding some noisy unique processes.

(cherry picked from commit 1f21c5c57f)
2022-08-01 16:41:46 +00:00
Samirbous 2fe7336f2b [Deprecated Rule] Potential Privilege Escalation via Local Kerberos R… (#2209)
* [Deprecated Rule] Potential Privilege Escalation via Local Kerberos Relay over LDAP

FPs in certain cases with no room for tuning.

* Update privilege_escalation_krbrelayup_suspicious_logon.toml

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

(cherry picked from commit 8d34416049)
2022-08-01 16:29:46 +00:00
Samirbous 84121d910e [Rule Tuning] Suspicious Process Access via Direct System Call (#2204)
Excluding some FPs by calltrace.

(cherry picked from commit a22fef8723)
2022-08-01 16:17:07 +00:00
Samirbous ccad691b30 [Rule Tuning] Remotely Started Services via RPC (#2211)
* [Rule Tuning] Remotely Started Services via RPC

excluding noisy FPs by process.executable to be compatible with winlog and endpoint

* Update lateral_movement_remote_services.toml

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

(cherry picked from commit 6f69695820)
2022-08-01 16:12:14 +00:00
Samirbous 38e9b64fd6 [Rule Tuning] Process Termination followed by Deletion (#2206)
Excluded some FPs by process.executable and file.path.

(cherry picked from commit 91896db453)
2022-08-01 16:02:39 +00:00
Samirbous 475d67f1e8 [Rule Tuning] Potential Remote Credential Access via Registry (#2203)
* [Rule Tuning] Potential Remote Credential Access via Registry

Excluding some noisy FPs by file.path (user and machine hives std paths) and event.action (scoped to logged-in)

* Update credential_access_remote_sam_secretsdump.toml

(cherry picked from commit 049fbf7979)
2022-08-01 15:50:38 +00:00
Samirbous 0dfae46dcc [Rule Tuning] Kerberos Traffic from Unusual Process (#2202)
Excluding couple of FPs by process.executables to reduce FPs rate.

(cherry picked from commit 527507835f)
2022-07-29 20:28:55 +00:00
Isai 5b183e66fa [Rule Tuning] Persistence via Update Orchestrator Service Hijack (#2195)
* [Rule Tuning] Persistence via Update Orchestrator Service Hijack

I changed the query to exclude FPs for safe executables found in telemetry: MoUsoCoreWorker.exe and OfficeC2RClient.exe. Changed the query type to KQL to account for the wildcard needed to capture 2 of the executable paths found in telemetry. I'm open to changing back to eql with suggestions.

* Update persistence_via_update_orchestrator_service_hijack.toml

revert back to eql

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

(cherry picked from commit 386a8202c0)
2022-07-29 20:12:27 +00:00
Samirbous 044b5a2c61 [Rule Tuning] Modification of WDigest Security Provider (#2201)
excluding svchost.exe running as system (main src of FPs for this use case).

(cherry picked from commit 6d61a68c29)
2022-07-29 17:46:25 +00:00
shashank-elastic 6dfbcb61eb Rule(s) to identify potential mining activities (#2185)
(cherry picked from commit b2b5c170dd)
2022-07-29 17:31:28 +00:00
shashank-elastic 40529e9150 Rule tuning as part of Linux Detection Rules Review (#2170)
(cherry picked from commit 8afded11e7)
2022-07-29 16:26:57 +00:00
Colson Wilhoit fcf7a23401 [Rule Tuning] MacOS Installer Package Net Event (#2193)
* [Rule Tuning] MacOS Installer Package Net Event

* Update rules/macos/execution_installer_package_spawned_network_event.toml

* Update rules/macos/execution_installer_package_spawned_network_event.toml

* Update execution_installer_package_spawned_network_event.toml

just deleting a typo

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

(cherry picked from commit 998afcf9c4)
2022-07-28 20:17:14 +00:00
Mika Ayenson b67ffd413a [Rule Tuning] Unexpected Child Process of macOS Screensaver Engine (#2184)
* add screensaver subtechnique

(cherry picked from commit 3a557503d1)
2022-07-27 18:50:26 +00:00
Jonhnathan 7a2d7237b6 [Security Content] Add Investigation Guides - Cloud - 3 (#2132)
* [Security Content] Add Investigation Guides - Cloud - 3

* Apply suggestions from code review

Co-authored-by: Joe Peeples <joe.peeples@elastic.co>

* Update rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml

* update dates

* Apply suggestions from review

Co-authored-by: Joe Peeples <joe.peeples@elastic.co>

Removed changes from:
- rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml

(selectively cherry picked from commit 91c00fd442)
2022-07-27 18:41:05 +00:00
Mika Ayenson 6a7b78f14c [Rule Tuning] Potential Microsoft Office Sandbox Evasion (#2123)
* filter run by macOS os type

(cherry picked from commit df670fac56)
2022-07-27 15:59:43 +00:00
Mika Ayenson 4534f04c0c fix typo in description (#2168)
(cherry picked from commit fcc9cc9d8e)
2022-07-27 12:52:56 +00:00
Mika Ayenson e11739383d [Rule Tuning] Authorization Plugin Modification (#2156)
* exclude files altered by shove processes

(cherry picked from commit cdafe17ffb)
2022-07-27 12:35:20 +00:00
Mika Ayenson 1fdfadbb7e [Rule Tuning] LaunchDaemon Creation or Modification and Immediate Loading (#2154)
* update query

(cherry picked from commit e6bab063dc)
2022-07-27 12:26:06 +00:00
shashank-elastic 8d4606d0dc Rule(s) deprecation as part of Linux Detection Rule Review (#2163)
(cherry picked from commit e9267e544c)
2022-07-26 13:19:25 +00:00
Colson Wilhoit 883607488a [New Rule] File made Immutable by Chattr (#2161)
* [New Rule] File made Immutable by Chattr

* Update rules/linux/defense_evasion_chattr_immutable_file.toml

(cherry picked from commit c222d4528d)
2022-07-25 18:12:55 +00:00
Colson Wilhoit a138a1f2a2 [New Rule] Chkconfig Service Add (#2159)
* [New Rule] Chkconfig Service Add

* Update rules/linux/persistence_chkconfig_service_add.toml

(cherry picked from commit 146f59f4bd)
2022-07-25 16:44:01 +00:00
Mika Ayenson a06662f91a filter Bitdefender FPs (#2109)
(cherry picked from commit b44714c83f)
2022-07-25 14:13:36 +00:00
Colson Wilhoit d988fcb0de [New Rule] Suspcious Etc File Creation (#2160)
* [New Rule] Suspcious Etc File Creation

* Update rules/linux/persistence_etc_file_creation.toml

* Update MITRE syntax

* Update rules/linux/persistence_etc_file_creation.toml

* Update rules/linux/persistence_etc_file_creation.toml

* Update rules/linux/persistence_etc_file_creation.toml

(cherry picked from commit 1746897359)
2022-07-25 13:49:28 +00:00
Mika Ayenson cbfa323c34 [Rule Tuning] Attempt to Unload Elastic Endpoint Security Kernel Extension (#2134)
* add subtechnique T1547/006/

(cherry picked from commit 286941cb8e)
2022-07-23 15:23:38 +00:00
Mika Ayenson f8a53b50b7 add CVE to tag (#2127)
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

(cherry picked from commit 1dc0fcec47)
2022-07-23 00:45:21 +00:00
Mika Ayenson cf1cdb1791 update description (#2149)
(cherry picked from commit f07c72254d)
2022-07-22 21:13:40 +00:00
Mika Ayenson 2a160e0106 [Rule Tuning] Remote SSH Login Enabled via systemsetup Command (#2147)
* exclude jamf fp and add ssh subtechnique
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit b3334941f9)
2022-07-22 21:11:14 +00:00
Mika Ayenson 53e035a91f exclude google drive FP (#2145)
(cherry picked from commit 84104773a6)
2022-07-22 21:01:10 +00:00
Mika Ayenson 5e21144896 [Rule Tuning] Suspicious Automator Workflows Execution (#2142)
* add subtechnique

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

(cherry picked from commit 44ae72d054)
2022-07-22 20:51:44 +00:00
Mika Ayenson f6ed0dcf7e update tags to include C2 tactic (#2140)
(cherry picked from commit f176b5ef57)
2022-07-22 20:40:24 +00:00
Colson Wilhoit 3be3902038 [Rule Tuning] Remove File Quarantine Attribute (#2129)
(cherry picked from commit d6527afd51)
2022-07-22 20:26:08 +00:00
Mika Ayenson db6ff5588c [Rule Tuning] Enumeration of Users or Groups via Built-in Commands (#2136)
* fix parens and exclude parent process FPs and update description

(cherry picked from commit 1e28385ea4)
2022-07-22 20:17:30 +00:00
Mika Ayenson ca898d0680 [Rule Tuning] Potential Privacy Control Bypass via TCCDB Modification (#2121)
* add exception for Bitdefender

(cherry picked from commit d2be29b226)
2022-07-22 20:08:50 +00:00
Mika Ayenson f1af12e81b [Rule Tuning] Modification of Environment Variable via Launchctl (#2119)
* add exception for vmoptions

(cherry picked from commit cefb84ae15)
2022-07-22 20:04:54 +00:00
Terrance DeJesus 61d671a1a6 [Rule Tuning] Missing MITRE ATT&CK Mappings (#2073)
* initial commit with eggshell mitre mapping added

* adding updated rules

* [Rule Tuning] MITRE for GCP rules

I've added Mitre references for the 4 GCP rules missing. Changed 3 of the rules from "Impact" to "Defense Evasion" based on the technique used and it's matched tactic.

* [Rule Tuning] Endgame Rule name updates for Mitre

Updated Endgame rule names for those with Mitre tactics to match the tactics.

* Update rules/integrations/aws/persistence_redshift_instance_creation.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* Update rules/integrations/aws/exfiltration_rds_snapshot_restored.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* adding 10 updated rules for google_workspace, ml and o365

* adding 22 rule updates for mitre att&ck mappings

* adding 24 rule updates related mainly to ML rules

* adding 3 rules related to detection via ML

* adding adjustments

* adding adjustments with solutions to recent pytest errors

* removed tabs from tags

* adjusted mappings and added techniques

* adjusted endgame rule mappings per review

* adjusted names to match different tactics

* added execution and defense evasion tag

* adjustments to address errors from merging with main

* added newlines to rules missing them at the end of the file

Co-authored-by: imays11 <59296946+imays11@users.noreply.github.com>
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>
2022-07-22 15:42:38 -04:00
Terrance DeJesus 141b00ec41 [Rule Tuning] Missing MITRE ATT&CK Mappings (#2073)
* initial commit with eggshell mitre mapping added

* adding updated rules

* [Rule Tuning] MITRE for GCP rules

I've added Mitre references for the 4 GCP rules missing. Changed 3 of the rules from "Impact" to "Defense Evasion" based on the technique used and it's matched tactic.

* [Rule Tuning] Endgame Rule name updates for Mitre

Updated Endgame rule names for those with Mitre tactics to match the tactics.

* Update rules/integrations/aws/persistence_redshift_instance_creation.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* Update rules/integrations/aws/exfiltration_rds_snapshot_restored.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* adding 10 updated rules for google_workspace, ml and o365

* adding 22 rule updates for mitre att&ck mappings

* adding 24 rule updates related mainly to ML rules

* adding 3 rules related to detection via ML

* adding adjustments

* adding adjustments with solutions to recent pytest errors

* removed tabs from tags

* adjusted mappings and added techniques

* adjusted endgame rule mappings per review

* adjusted names to match different tactics

* added execution and defense evasion tag

* adjustments to address errors from merging with main

* added newlines to rules missing them at the end of the file

Co-authored-by: imays11 <59296946+imays11@users.noreply.github.com>
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

Removed changes from:
- rules/integrations/google_workspace/application_added_to_google_workspace_domain.toml
- rules/integrations/google_workspace/domain_added_to_google_workspace_trusted_domains.toml
- rules/integrations/google_workspace/google_workspace_admin_role_deletion.toml
- rules/integrations/google_workspace/google_workspace_mfa_enforcement_disabled.toml
- rules/integrations/google_workspace/google_workspace_policy_modified.toml
- rules/integrations/google_workspace/mfa_disabled_for_google_workspace_organization.toml
- rules/ml/ml_linux_anomalous_compiler_activity.toml
- rules/ml/ml_linux_anomalous_metadata_process.toml
- rules/ml/ml_linux_anomalous_metadata_user.toml
- rules/ml/ml_linux_anomalous_process_all_hosts.toml
- rules/ml/ml_linux_anomalous_sudo_activity.toml
- rules/ml/ml_linux_anomalous_user_name.toml
- rules/ml/ml_linux_system_information_discovery.toml
- rules/ml/ml_linux_system_network_configuration_discovery.toml
- rules/ml/ml_linux_system_network_connection_discovery.toml
- rules/ml/ml_linux_system_process_discovery.toml
- rules/ml/ml_linux_system_user_discovery.toml
- rules/ml/ml_rare_process_by_host_linux.toml
- rules/ml/ml_rare_process_by_host_windows.toml
- rules/ml/ml_suspicious_login_activity.toml
- rules/ml/ml_windows_anomalous_metadata_process.toml
- rules/ml/ml_windows_anomalous_metadata_user.toml
- rules/ml/ml_windows_anomalous_path_activity.toml
- rules/ml/ml_windows_anomalous_process_all_hosts.toml
- rules/ml/ml_windows_anomalous_process_creation.toml
- rules/ml/ml_windows_anomalous_script.toml
- rules/ml/ml_windows_anomalous_service.toml
- rules/ml/ml_windows_anomalous_user_name.toml
- rules/ml/ml_windows_rare_user_runas_event.toml
- rules/ml/ml_windows_rare_user_type10_remote_login.toml
- rules/windows/defense_evasion_execution_lolbas_wuauclt.toml

(selectively cherry picked from commit e8c39d19a7)
2022-07-22 18:31:42 +00:00
Mika Ayenson c12b3dcf50 [Rule Tuning] Attempt to Remove File Quarantine Attribute (#2117)
* Add exceptions for browser FPs

(cherry picked from commit cd11001fe8)
2022-07-22 18:27:50 +00:00
Mika Ayenson 5c5f49a96c [Rule Tuning] Kerberos Cached Credentials Dumping (#2103)
* Updated description to include threat actor utilization

(cherry picked from commit c1c83a536c)
2022-07-22 18:20:06 +00:00
Mika Ayenson 6e98740a90 [Rule Tuning] Access to Keychain Credentials Directories (#2101)
* rule tune to remove noisy FPs

(cherry picked from commit a9de227cfa)
2022-07-22 18:15:16 +00:00
Mika Ayenson 75560f96ec [Rule Tuning] Access of Stored Browser Credentials (#2098)
* audit update : added technique T1539 and excluded additional cookies path

(cherry picked from commit aaf9a708ae)
2022-07-22 17:58:53 +00:00
Jonhnathan cf4b6e6e1e [Security Content] Add Investigation Guides - Cloud - 2 (#2124)
* [Security Content] Add Investigation Guides - Cloud - 2

* Replace config/setup

* Applies suggestions from review

* Update credential_access_aws_iam_assume_role_brute_force.toml

* Apply suggestions from code review

* Update credential_access_aws_iam_assume_role_brute_force.toml

* Apply suggestions from code review

Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com>

Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com>

(cherry picked from commit 7ddae4b493)
2022-07-22 17:33:44 +00:00