Skip to content

Commit

Permalink
[SIEM] version 7.7 rule import (#61903) (#62012)
Browse files Browse the repository at this point in the history
* rule import

* Update x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/windows_credential_dumping_msbuild.json

Co-Authored-By: Garrett Spong <[email protected]>

* Update add_prepackaged_rules_schema.ts

* Update rule.ts

* updates 'prebuilt_rules_loaded' data (#61940)

Co-authored-by: Garrett Spong <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
Co-authored-by: MadameSheema <[email protected]>

Co-authored-by: The SpaceCake Project <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
Co-authored-by: MadameSheema <[email protected]>
  • Loading branch information
4 people authored Mar 31, 2020
1 parent 8293684 commit 245d302
Show file tree
Hide file tree
Showing 132 changed files with 2,423 additions and 370 deletions.
2 changes: 1 addition & 1 deletion x-pack/legacy/plugins/siem/cypress/objects/rule.ts
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
* you may not use this file except in compliance with the Elastic License.
*/

export const totalNumberOfPrebuiltRules = 92;
export const totalNumberOfPrebuiltRules = 130;

interface Mitre {
tactic: string;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ import { hasListsFeature } from '../../feature_flags';
* - immutable is forbidden but defaults to true instead of to false and it can only ever be true
* - enabled defaults to false instead of true
* - version is a required field that must exist
* - index is a required field that must exist
* - index is a required field that must exist if type !== machine_learning
*/
export const addPrepackagedRulesSchema = Joi.object({
actions: actions.default([]),
Expand All @@ -71,7 +71,11 @@ export const addPrepackagedRulesSchema = Joi.object({
.forbidden()
.default(true)
.valid(true),
index: index.required(),
index: index.when('type', {
is: 'machine_learning',
then: Joi.forbidden(),
otherwise: Joi.required(),
}),
interval: interval.default('5m'),
query: query.when('type', {
is: 'machine_learning',
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
"apm-*-transaction*"
],
"language": "kuery",
"max_signals": 100,
"name": "Web Application Suspicious Activity: POST Request Declined",
"query": "http.response.status_code:403 and http.request.method:post",
"references": [
Expand All @@ -17,9 +16,9 @@
"rule_id": "a87a4e42-1d82-44bd-b0bf-d9b7f91fb89e",
"severity": "medium",
"tags": [
"Elastic",
"APM"
"APM",
"Elastic"
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
"apm-*-transaction*"
],
"language": "kuery",
"max_signals": 100,
"name": "Web Application Suspicious Activity: Unauthorized Method",
"query": "http.response.status_code:405",
"references": [
Expand All @@ -17,9 +16,9 @@
"rule_id": "75ee75d8-c180-481c-ba88-ee50129a6aef",
"severity": "medium",
"tags": [
"Elastic",
"APM"
"APM",
"Elastic"
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Adversary Behavior - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:rules_engine_event",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Dumping - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Dumping - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Manipulation - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Manipulation - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Exploit - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Exploit - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Malware - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:file_classification_event and endgame.metadata.type:detection",
"risk_score": 99,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Malware - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:file_classification_event and endgame.metadata.type:prevention",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Permission Theft - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_protection_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Permission Theft - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_protection_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Process Injection - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:kernel_shellcode_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Process Injection - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:kernel_shellcode_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Ransomware - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:ransomware_event and endgame.metadata.type:detection",
"risk_score": 99,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Ransomware - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:ransomware_event and endgame.metadata.type:prevention",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Adding Hidden File Attribute via Attrib",
"query": " event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"attrib.exe\" and process.args:\"+h\"",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:attrib.exe and process.args:+h",
"risk_score": 21,
"rule_id": "4630d948-40d4-4cef-ac69-4002e29bc3db",
"severity": "low",
Expand Down Expand Up @@ -48,4 +47,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Adobe Hijack Persistence",
"query": "file.path:(\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe\" or \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe\") and event.action:\"File created (rule: FileCreate)\" and not process.name:msiexec.exe",
"risk_score": 21,
Expand Down Expand Up @@ -33,4 +32,4 @@
],
"type": "query",
"version": 2
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Clearing Windows Event Logs",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and (process.name:\"wevtutil.exe\" and process.args:\"cl\") or (process.name:\"powershell.exe\" and process.args:\"Clear-EventLog\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:wevtutil.exe and process.args:cl or process.name:powershell.exe and process.args:Clear-EventLog",
"risk_score": 21,
"rule_id": "d331bbe2-6db4-4941-80a5-8270db72eb61",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Delete Volume USN Journal with Fsutil",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"fsutil.exe\" and process.args:(\"usn\" and \"deletejournal\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:fsutil.exe and process.args:(deletejournal and usn)",
"risk_score": 21,
"rule_id": "f675872f-6d85-40a3-b502-c0d2ef101e92",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Deleting Backup Catalogs with Wbadmin",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"wbadmin.exe\" and process.args:(\"delete\" and \"catalog\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:wbadmin.exe and process.args:(catalog and delete)",
"risk_score": 21,
"rule_id": "581add16-df76-42bb-af8e-c979bfb39a59",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Loading

0 comments on commit 245d302

Please sign in to comment.