Commit Graph

2052 Commits

Author SHA1 Message Date
Jonhnathan d42128cdbf [Rule Tuning] Windows Misc Tuning (#4870)
* [Rule Tuning] Windows Misc Tuning

* Update execution_command_shell_started_by_svchost.toml

* bump

* Update rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml

* Update defense_evasion_persistence_account_tokenfilterpolicy.toml
2025-07-07 10:32:12 -03:00
Terrance DeJesus 6a083ec984 [New Rule] Unusual ROPC Login Attempt by User Principal (#4871)
* new rule Unusual ROPC Login Attempt by User Principal

* linted
2025-07-03 14:43:19 -04:00
Ruben Groenewoud 715e3f44f4 [New Rule] Kubectl Apply Pod from URL (#4855)
* [New Rule] Kubectl Apply Pod from URL

* Update execution_kubectl_apply_pod_from_url.toml
2025-07-03 10:47:07 +02:00
Ruben Groenewoud 8b3b1e516f [New Rule] Kubernetes Events Deleted (#4853)
* [New Rule] Kubernetes Events Deleted

* Update defense_evasion_events_deleted.toml
2025-07-03 10:22:03 +02:00
Ruben Groenewoud 26e35fd03b [Rule Tuning] Potential Linux Tunneling and/or Port Forwarding (#4858) 2025-07-03 09:50:30 +02:00
Ruben Groenewoud 3efcd70f8c [New Rule] Kubernetes Sensitive Configuration File Activity (#4849)
* [New Rule] Kubernetes Sensitive Configuration File Activity

* Update rules/linux/persistence_kubernetes_sensitive_file_activity.toml
2025-07-02 17:16:25 +02:00
Terrance DeJesus 016cdf2cbb [New Rule] Microsoft Entra ID Suspicious Cloud Device Registration (#4802)
* new rule Microsoft Entra ID Suspicious Cloud Device Registration

* adjusted backticks in non-ecs and rule

* linted

* adjusted uuid; bumped patch version
2025-07-02 10:03:08 -04:00
Terrance DeJesus 10d95baa2b [Rule Tuning] Microsoft Entra ID Exccessive Account Lockouts Detected (#4851)
* adjusting Microsoft Entra ID Exccessive Account Lockouts Detected

* removing unit test

* added newline

* adjusted dates
2025-07-01 08:18:18 -04:00
Ruben Groenewoud 0847c32333 [New Rule] Potential Kubectl Masquerading (#4832)
* [New Rule] Potential Kubectl Masquerading

* Update defense_evasion_potential_kubectl_masquerading.toml

* ++

* ++

* Update defense_evasion_potential_kubectl_masquerading.toml

* Update rules/linux/defense_evasion_potential_kubectl_masquerading.toml
2025-06-30 13:47:58 +02:00
Ruben Groenewoud bc87ca1d5b [New Rule] Kubectl Network Configuration Modification (#4836)
* [New Rule] Kubectl Network Configuration Modification

* ++
2025-06-30 10:53:32 +02:00
Ruben Groenewoud 786542a9d4 [New Rule] Kubernetes Direct API Request via Curl or Wget (#4841) 2025-06-30 10:34:10 +02:00
Ruben Groenewoud 2c4157066f [New Rule] Kubernetes Forbidden Creation Request (#4843) 2025-06-30 10:20:33 +02:00
Isai bf1dc2547f [Rule Tunings] AWS SSM Command Document Created by Rare User (#4848)
* [Rule Tunings] AWS SSM Command Document Created by Rare User

## AWS SSM Command Document Created by Rare User
Rule executes as expected and has very few alerts in telemetry. However, it is one of the rules timing out occasionally.
- reduced execution window
- reduced new terms history window
- replaced wildcards with the flattened field in the query, which should improve performance
- replaced `aws.cloudtrail.user_identity.arn` with combination of `cloud.account.id` and `user.name` to account for Assumed Roles. This will only evaluate the role instead of each individual role session, which will improve performance.
- added investigation fields
- corrected tags
- added mitre technique

## AWS SSM `SendCommand` Execution by Rare User"
- added investigation fields
- added tag

* update pyproject.toml

update pyproject.toml version
2025-06-27 13:24:27 -04:00
Samirbous 09b928fb84 Update multiple_alerts_different_tactics_host.toml (#4854) 2025-06-27 09:53:42 -03:00
Ruben Groenewoud 7c07033354 [Deprecation] Suspicious File Creation in /etc for Persistence (#4850)
* [Deprecation] Suspicious File Creation in /etc for Persistence

* [Deprecation] Suspicious File Creation in /etc for Persistence

* Update persistence_etc_file_creation.toml

* Fix
2025-06-27 10:14:53 +02:00
Terrance DeJesus 3bd9ab8d1d [New Rule] Excessive Microsoft 365 Mailbox Items Accessed (#4825)
* new rule Excessive Microsoft 365 Mailbox Items Accessed

* bumping patch version
2025-06-26 12:51:11 -04:00
Terrance DeJesus fb03295bbf tuning Suspicious Microsoft 365 UserLoggedIn via OAuth Code (#4847) 2025-06-26 10:43:57 -04:00
Terrance DeJesus ba429070e3 [New Rule] Entra ID RT to PRT Transition from Same User and Device (#4845) 2025-06-25 14:52:50 -04:00
Samirbous 4fb31c7ea6 Update command_and_control_new_terms_commonly_abused_rat_execution.toml (#4842)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-06-25 12:39:48 -03:00
Isai fe327a7560 [Rule Tunings] AWS Role Assumption By Service / User (#4827)
AWS Role Assumption By Service
The newest versions of this rule seem fine in telemetry and the rule executes as expected
- removed MD from description
- adjusted execution window for 1 m look back
- fixed inaccuracies in Investigation Guide
- added Lateral Movement tag
- adjusted highlighted fields
- reduced history window from 14 to 10 days

AWS Role Assumption By User
This rule seem fine in telemetry and the rule executes as expected
- removed MD from description
- fixed inaccuracies in Investigation Guide
- added Lateral Movement tag
- adjusted highlighted fields
- added `cloud.account.id` to new_terms field to account for duplicate user.names across cloud accounts
- replaced new terms flattened field for `aws.cloudtrail.resources.arn`, which gives the same result and remains consistent with the other rule.
2025-06-24 18:07:18 -04:00
Isai 1ed322f8d9 [Rule Tuning] AWS SSM SendCommand Execution by Rare User (#4828)
Rule is triggering as expected, very low instances of alerts in telemetry
- adjusted execution window
- slight edits to IG for accuracy
- removed exclusion `and not aws.cloudtrail.user_identity.arn: *AWSServiceRoleForAmazonSSM/StateManagerService*` from the query. This is a service-linked role meant to be used by AWS internal services. Therefore, the existing exclusion `and not source.address: "ssm.amazonaws.com"` already excludes the use of this role by the SSM service. I show this in the screenshot below. This will remove the use of wildcards in the query and improve performance.
- changed the new terms fields to use combination of `cloud.account.id` and `user.name` so that only roles (and not individual role sessions) are being evaluated. adding `cloud.account.id` accounts for duplicate user.names across multiple accounts.
2025-06-24 17:22:20 -04:00
Terrance DeJesus c986138333 [Rule Tuning] Suspicious Microsoft 365 Mail Access by Unusual ClientAppId (#4806)
* tuning rule Suspicious Microsoft 365 Mail Access by Unusual ClientAppId

* adjusted tactic tag

* updating patch version

* updating patch version

* bumping patch version
2025-06-24 14:20:33 -04:00
Jonhnathan 82708867e3 [Rule Tuning] First Time Seen NewCredentials Logon Process (#4844)
* [Rule Tuning] First Time Seen NewCredentials Logon Process

* Update rules/windows/privilege_escalation_newcreds_logon_rare_process.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-06-24 12:25:56 -03:00
Ruben Groenewoud d59addb710 [Rule Tuning] Sharpening Kubernetes Rules Indices (#4822)
* [Rule Tuning] Sharpening Kubernetes Rules Indices

* ++
2025-06-24 14:11:31 +02:00
Ruben Groenewoud e666cabb3d [Rule Tuning] Added Kubernetes Data Source Tag (#4831) 2025-06-24 13:18:58 +02:00
Samirbous 4b20d69c03 [Tuning] Elevation via SCM rules (#4837)
* Update privilege_escalation_krbrelayup_service_creation.toml

* Update privilege_escalation_windows_service_via_unusual_client.toml

* Update non-ecs-schema.json

* Update non-ecs-schema.json

* Update pyproject.toml
2025-06-20 09:52:59 +01:00
Ruben Groenewoud b9c6517666 [New Rule] Forbidden Request from Unusual User Agent in Kubernetes (#4818)
* [New Rule] Forbidden Request from Unusual User Agent in Kubernetes

* Update rules/integrations/kubernetes/execution_forbidden_request_from_unsual_user_agent.toml
2025-06-19 09:43:28 +02:00
Terrance DeJesus 0aefedd6f1 [New Rule] Suspicious ADRS Token Request by Microsoft Auth Broker (#4801)
* new rule Suspicious ADRS Token Request by Microsoft Auth Broker

* bumping patch version

* updating patch version
2025-06-18 14:41:04 -04:00
Terrance DeJesus 0c68fcb7d9 [New Rule] Entra ID User Signed In from Unusual Device (#4804)
* new rule Entra ID User Signed In from Unusual Device

* adjusted patch version

* adjusted patch version

* updating patch version
2025-06-18 14:13:42 -04:00
Terrance DeJesus 7b1139b219 [Rule Tuning] Expand Scope of Entra ID Brute Force Sign-In Attempts (#4777)
* tuning rule to not be M365 specific

* adjusted rules

* linted

* linted; adjusted descriptions

* tuned rule logic

* adjusted time logic

* adjusted query logic

* removed 50053 from inclusion

* adjusted query
2025-06-18 10:59:50 -04:00
Samirbous caf6630325 Update impact_stop_process_service_threshold.toml (#4813) 2025-06-18 09:44:09 +05:30
Ruben Groenewoud dd4576d127 [New Rule] Kubernetes Service Account Secret Access (#4816) 2025-06-18 09:31:35 +05:30
Terrance DeJesus 4fb8483f2d [Rule Tuning] Suspicious Activity via Auth Broker On-Behalf-of Principal User (#4793)
* rule tuning Suspicious Activity via Auth Broker On-Behalf-of Principal User

* adjusted investigation guide

* adjusted time
2025-06-17 19:10:55 -04:00
Jonhnathan 1f71191c85 [New Rules] SPN Spoofing / Coercion Rules (#4815)
* [New Rules] SPN Spoofing / Coercion Rules

* Apply suggestions from code review

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules/windows/credential_access_kerberos_coerce.toml

* Update rules/windows/credential_access_kerberos_coerce_dns.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules/windows/credential_access_kerberos_coerce.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* .

* Update rules/windows/credential_access_kerberos_coerce_dns.toml

* Update rules/windows/credential_access_kerberos_coerce_dns.toml

* Update pyproject.toml

* missing tag

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-06-17 18:50:28 -03:00
Isai 133a0799cd [Rule Tuning] AWS IAM Assume Role Policy Update (#4799)
* [Rule Tuning] AWS IAM Assume Role Policy Update

- changed time window to have only 1 minute lookback
- changed the new terms field to look at combination of cloud.account.id, user.name, and roleName. This is to account for the problem with using user_identity.arn for AssumedRoles. Roles are identities in AWS that are granted a set of permissions and can then be assumed by various users across many different sessions. Each of these sessions is designated a session name which is attached to the `user_identity.arn`. This means that each time a Role is assumed, there is a unique user_identity.arn created. This rule is meant to capture unique instances of the Role itself which is captured separate from the individual session names in the `user.name` field. `cloud.account.id` has been added to the new_terms fields to account for organizations with multiple AWS account ids, which may reuse certain user.names across accounts.

This may improve performance especially in environments where there are many users assuming the same role and updating it's trust policy as a part of normal operations.

* remove markdown from description
2025-06-17 15:03:55 -04:00
Isai 74d1715f6e [Rule Tuning] AWS EC2 User Data Retrieval for EC2 Instance (#4808)
* [Rule Tuning] AWS EC2 User Data Retrieval for EC2 Instance

- changed execution window
- explicitly added flattened fields to query, to reduce wildcard usage
- added investigation fields
- changed new terms field to evaluate `user.name` over `aws.cloudtrail.user_identity.arn` so that only the role name for Assumed Role identitites is being evaluated instead of each individual session. This should greatly impact performance as most instances of this rule in telemetry is triggered by Assumed Roles.

* Apply suggestions from code review

* remove instanceId parameter

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-06-17 14:51:18 -04:00
Isai cd003fc9a7 [New Rule] AWS CloudTrail Log Evasion (#4788)
* [New Rule] AWS CloudTrail Log Evasion

Identifies the evasion of cloudtrail logging for IAM actions involving policy creation, modification or attachment. When making certain policy-related API calls, an adversary may pad the associated policy document with whitespaces to trigger CloudTrail’s logging size constraints, resulting in incomplete logging where critical details about the policy are omitted. By exploiting this gap, threat actors can bypass monitoring performed through CloudTrail and can effectively obscure unauthorized changes. This rule looks for IAM API calls with the requestParameters property containing reason:”requestParameters too large” and omitted:true.

This is a known gap in AWS with no immediate remediation steps. While the size constraint issue affects additional services, IAM policy-related API calls are the only that pose a security risk which is why this rule is scoped specifically to `event.provider: iam.amazonaws.com`.  For additional background on the evasion technique refer to Permisso's [research](https://permiso.io/blog/cloudtrail-logging-evasion-where-policy-size-matters).

* aligning IG and rule name

* added investigation fields

added investigation fields

* change severity

* updating pyproject version
2025-06-17 13:58:26 -04:00
Isai e84892a115 [Rule Tuning] AWS EC2 Deprecated AMI Discovery (#4784)
* [Rule Tuning] AWS EC2 Deprecated AMI Discovery

Rule triggers as expected
Telemetry shows only known FP risks from tools that are intentionally including deprecated AMIs in their searches (these should be excluded by customers)
- changed the query to reduce use of multiple wildcards
- changed the execution window
- removed unnecessary parts of IG
- added to the highlighted fields

* update non-ecs-schema.json

update non-ecs-schema.json with field "aws.cloudtrail.flattened.request_parameters.ownersSet.items.owner"

* update version in pyproject.toml

update version in pyproject.toml

* Update pyproject.toml
2025-06-17 13:19:22 -04:00
Jonhnathan 3bc57088a1 [Rule Tuning] PowerShell ES|QL Rules Tuning (#4785)
* [Rule Tuning] PowerShell ES|QL Rules Tuning

* Update defense_evasion_posh_obfuscation_whitespace_special_proportion.toml
2025-06-17 10:36:51 -03:00
Ruben Groenewoud 386a4b85eb [New Rule] Kubeconfig File Creation or Modification (#4810)
* [New Rule] Kubeconfig File Creation or Modification

* Update lateral_movement_kubeconfig_file_activity.toml
2025-06-17 15:01:07 +02:00
Ruben Groenewoud 6bc808916b [New Rule] Kubeconfig File Discovery (#4811)
* [New Rule] Kubeconfig File Discovery

* Update discovery_kubeconfig_file_discovery.toml
2025-06-17 14:42:39 +02:00
Ruben Groenewoud 103fbf12c8 [Rule Tuning] Container Management Utility Run Inside A Container (#4809)
* [Rule Tuning] Container Management Utility Run Inside A Container

* ++
2025-06-17 14:30:34 +02:00
Ruben Groenewoud dfd46a09e8 [New Rule] Kubectl Permission Discovery (#4812) 2025-06-17 14:14:35 +02:00
Ruben Groenewoud ac57818efb [Rule Tuning] Kubernetes User Exec into Pod (#4814) 2025-06-17 14:02:29 +02:00
Samirbous 5273729106 [New] Potential Machine Account Relay Attack via SMB (#4803)
* [New] Potential Machine Account Relay Attack via SMB

Identify a server machine account accessing itself via SMB but from a remote source.ip, this behavior is abnormal and match SMB relay:

* Update credential_access_machine_account_smb_relay.toml

* Update credential_access_machine_account_smb_relay.toml

* Update credential_access_machine_account_smb_relay.toml

* Update rules/windows/credential_access_machine_account_smb_relay.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update credential_access_machine_account_smb_relay.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-06-16 17:16:04 +01:00
Jonhnathan d8d898d12d [Rule Tuning] Outlook Home Page Registry Modification (#4798) 2025-06-16 08:01:45 -03:00
Samirbous 718b64f1df Update execution_downloaded_url_file.toml (#4794) 2025-06-12 12:11:19 +01:00
Samirbous ba55fb412b [New] Potential CVE-2025-33053 Exploitation (#4795)
* Create initial_access_url_cve_2025_33053.toml

* Delete docs/docset.yml

* Revert "Delete docs/docset.yml"

This reverts commit 5d0e6a68eb5510b6f3d9325cfcdf156bf11e1992.

* Update initial_access_url_cve_2025_33053.toml
2025-06-12 08:08:20 +01:00
Terrance DeJesus c7c1586160 [Rule Deprecation] Azure Entra Sign-in Brute Force Microsoft 365 Accounts by Repeat Source (#4780)
* rule deprecation

* adjusted investigation guide
2025-06-10 12:02:54 -04:00
Terrance DeJesus 9569aa4860 [New Rule] Microsoft Entra ID Excessive Account Lockouts Detected (#4782)
* new rule Microsoft Entra ID Exccessive Account Lockouts Detected

* updating investigation guide

* removed user agent exception

* linted
2025-06-10 11:31:35 -04:00