1.7 KiB
1.7 KiB
Hunt: New - Guidelines
Welcome to the hunting folder within the detection-rules repository! This directory houses a curated collection of threat hunting queries designed to enhance security monitoring and threat detection capabilities using the Elastic Stack.
Documentation and Context
- Detailed description of the Hunt.
- List any new fields required in ECS/data sources.
- Link related issues or PRs.
- Include references.
- Field Usage: Ensure standardized fields for compatibility across different data environments and sources.
Hunt Metadata Checks
author: The name of the individual or organization authoring the rule.creation_datematches the date of creation PR initially merged.min_stack_versionsupports the widest stack versions.nameanddescriptionare descriptive and typo-free.language: The query language(s) used in the rule, such asKQL,EQL,ES|QL,OsQuery, orYARA.queryis inclusive, not overly exclusive, considering performance for diverse environments.integrationaligns with theindex. Ensure updates if the integration is newly introduced.setupincludes necessary steps to configure the integration.noteincludes additional information (e.g., Triage and analysis investigation guides, timeline templates).tagsare relevant to the threat and align withEXPECTED_HUNT_TAGSindefinitions.py.threat,techniques, andsubtechniquesmap to ATT&CK whenever possible.
Testing and Validation
- Evidence of testing and detecting the expected threat.
- Check for the existence of coverage to prevent duplication.
- Generate Markdown: Run
python generate_markdown.pyto update the documentation.