Skip to content

Commit

Permalink
[Detection Rules] Add 7.14 rules (#106933)
Browse files Browse the repository at this point in the history
  • Loading branch information
rw-access authored Jul 28, 2021
1 parent 0ad5f75 commit b8522b7
Show file tree
Hide file tree
Showing 50 changed files with 677 additions and 120 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,8 @@
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity."
],
"index": [
"apm-*-transaction*"
"apm-*-transaction*",
"traces-apm*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -25,5 +26,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 6
"version": 7
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,8 @@
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity."
],
"index": [
"apm-*-transaction*"
"apm-*-transaction*",
"traces-apm*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -25,5 +26,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 6
"version": 7
}
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,8 @@
}
],
"index": [
"apm-*-transaction*"
"apm-*-transaction*",
"traces-apm*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -43,5 +44,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 6
"version": 7
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,8 @@
"This rule does not indicate that a SQL injection attack occurred, only that the `sqlmap` tool was used. Security scans and tests may result in these errors. If the source is not an authorized security tester, this is generally suspicious or malicious activity."
],
"index": [
"apm-*-transaction*"
"apm-*-transaction*",
"traces-apm*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -25,5 +26,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 6
"version": 7
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,12 @@
"false_positives": [
"This rule should be tailored to either exclude systems, as sources or destinations, in which this behavior is expected."
],
"from": "now-9m",
"index": [
"packetbeat-*"
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "lucene",
"license": "Elastic License v2",
Expand All @@ -25,7 +29,8 @@
"Elastic",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -58,5 +63,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 5
"version": 6
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,13 @@
"author": [
"Elastic"
],
"description": "This rule detects the use of the default Cobalt Strike Team Server TLS certificate. Cobalt Strike is software for Adversary Simulations and Red Team Operations which are security assessments that replicate the tactics and techniques of an advanced adversary in a network. If using Filebeat, this rule requires the Suricata or Zeek modules. Modifications to the Packetbeat configuration can be made to include MD5 and SHA256 hashing algorithms (the default is SHA1) - see the Reference section for additional information on module configuration.",
"description": "This rule detects the use of the default Cobalt Strike Team Server TLS certificate. Cobalt Strike is software for Adversary Simulations and Red Team Operations which are security assessments that replicate the tactics and techniques of an advanced adversary in a network. Modifications to the Packetbeat configuration can be made to include MD5 and SHA256 hashing algorithms (the default is SHA1) - see the Reference section for additional information on module configuration.",
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*"
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -27,7 +30,8 @@
"Post-Execution",
"Threat Detection",
"Elastic",
"Network"
"Network",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -55,5 +59,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 4
"version": 5
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,12 @@
"false_positives": [
"Exclude DNS servers from this rule as this is expected behavior. Endpoints usually query local DNS servers defined in their DHCP scopes, but this may be overridden if a user configures their endpoint to use a remote DNS server. This is uncommon in managed enterprise networks because it could break intranet name resolution when split horizon DNS is utilized. Some consumer VPN services and browser plug-ins may send DNS traffic to remote Internet destinations. In that case, such devices or networks can be excluded from this rule when this is expected behavior."
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*"
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License v2",
Expand All @@ -26,7 +29,8 @@
"Elastic",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand All @@ -41,5 +45,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 9
"version": 10
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,12 @@
"false_positives": [
"Downloading RAR or PowerShell files from the Internet may be expected for certain systems. This rule should be tailored to either exclude systems as sources or destinations in which this behavior is expected."
],
"from": "now-9m",
"index": [
"packetbeat-*"
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "lucene",
"license": "Elastic License v2",
Expand All @@ -26,7 +30,8 @@
"Elastic",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand All @@ -47,5 +52,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 5
"version": 6
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,12 @@
"false_positives": [
"This rule could identify benign domains that are formatted similarly to FIN7's command and control algorithm. Alerts should be investigated by an analyst to assess the validity of the individual observations."
],
"from": "now-9m",
"index": [
"packetbeat-*"
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "lucene",
"license": "Elastic License v2",
Expand All @@ -24,7 +28,8 @@
"Elastic",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -57,5 +62,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 5
"version": 6
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,12 @@
"false_positives": [
"This rule should be tailored to exclude systems, either as sources or destinations, in which this behavior is expected."
],
"from": "now-9m",
"index": [
"packetbeat-*"
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "lucene",
"license": "Elastic License v2",
Expand All @@ -25,7 +29,8 @@
"Elastic",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -58,5 +63,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 5
"version": 6
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
Expand All @@ -24,7 +25,8 @@
"Host",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand All @@ -39,5 +41,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 7
"version": 8
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
Expand All @@ -28,7 +29,8 @@
"Host",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -58,5 +60,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 7
"version": 8
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
Expand All @@ -27,7 +28,8 @@
"Host",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -72,5 +74,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 9
"version": 10
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
Expand All @@ -24,7 +25,8 @@
"Host",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -69,5 +71,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 7
"version": 8
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
],
"from": "now-9m",
"index": [
"auditbeat-*",
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
Expand All @@ -27,7 +28,8 @@
"Host",
"Network",
"Threat Detection",
"Command and Control"
"Command and Control",
"Host"
],
"threat": [
{
Expand Down Expand Up @@ -63,5 +65,5 @@
],
"timestamp_override": "event.ingested",
"type": "query",
"version": 9
"version": 10
}
Loading

0 comments on commit b8522b7

Please sign in to comment.