-
Notifications
You must be signed in to change notification settings - Fork 8.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[SIEM][Detection Engine] Added 10 more rules for prepackaging
## Summary * Added 10 more rules for prepackaging ### Checklist Use ~~strikethroughs~~ to remove checklist items you don't feel are applicable to this PR. ~~- [ ] This was checked for cross-browser compatibility, [including a check against IE11](https://github.com/elastic/kibana/blob/master/CONTRIBUTING.md#cross-browser-compatibility)~~ ~~- [ ] Any text added follows [EUI's writing guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses sentence case text and includes [i18n support](https://github.com/elastic/kibana/blob/master/packages/kbn-i18n/README.md)~~ ~~- [ ] [Documentation](https://github.com/elastic/kibana/blob/master/CONTRIBUTING.md#writing-documentation) was added for features that require explanation or tutorials~~ ~~- [ ] [Unit or functional tests](https://github.com/elastic/kibana/blob/master/CONTRIBUTING.md#cross-browser-compatibility) were updated or added to match the most common scenarios~~ ~~- [ ] This was checked for [keyboard-only and screenreader accessibility](https://developer.mozilla.org/en-US/docs/Learn/Tools_and_testing/Cross_browser_testing/Accessibility#Accessibility_testing_checklist)~~ ### For maintainers ~~- [ ] This was checked for breaking API changes and was [labeled appropriately](https://github.com/elastic/kibana/blob/master/CONTRIBUTING.md#release-notes-process)~~ - [x] This includes a feature addition or change that requires a release note and was [labeled appropriately](https://github.com/elastic/kibana/blob/master/CONTRIBUTING.md#release-notes-process)
- Loading branch information
1 parent
f89ddc6
commit e08e28b
Showing
11 changed files
with
190 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
17 changes: 17 additions & 0 deletions
17
...er/lib/detection_engine/rules/prepackaged_rules/splunk_child_processes_of_spoolsvexe.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "2f026c73-bb63-455e-abdf-f11f463acf0d", | ||
"risk_score": 50, | ||
"description": "Splunk - Child Processes of Spoolsv.exe", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Child Processes of Spoolsv.exe", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "process.parent.name:spoolsv.exe and not process.name:regsvr32.exe ", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...b/detection_engine/rules/prepackaged_rules/splunk_detect_large_outbound_icmp_packets.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "e108c0c6-5ee8-47a0-8c23-ec47ba3a9b00", | ||
"risk_score": 50, | ||
"description": "Splunk - Detect Large Outbound ICMP Packets", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Detect Large Outbound ICMP Packets", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "network.transport:icmp and network.bytes>1000 and not destination.ip:10.0.0.0/8 and not destination.ip:172.16.0.0/12 and not destination.ip:192.168.0.0/16", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
.../detection_engine/rules/prepackaged_rules/splunk_detect_long_dns_txt_record_response.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "2cdf84be-1c9c-4184-9880-75b9a6ddeaba", | ||
"risk_score": 50, | ||
"description": "Splunk - Detect Long DNS TXT Record Response", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Detect Long DNS TXT Record Response", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "network.protocol:dns and server.bytes>100 and not destination.ip:10.0.0.0/8 and not destination.ip:172.16.0.0/12 and not destination.ip:192.168.0.0/16 and not destination.ip:169.254.169.254 and not destination.ip:127.0.0.53", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...r/lib/detection_engine/rules/prepackaged_rules/splunk_detect_new_local_admin_account.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "030fc8e4-2c5f-4cc9-a6bd-2b6b7b98ae16", | ||
"risk_score": 50, | ||
"description": "Splunk - Detect New Local Admin account", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Detect New Local Admin account", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "event.code:(4720 or 4732) and winlog.event_data.TargetUserName:Administrators", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...b/detection_engine/rules/prepackaged_rules/splunk_detect_psexec_with_accepteula_flag.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "4b63cf13-9043-41e3-84ec-6e39eb0d407e", | ||
"risk_score": 50, | ||
"description": "Splunk - Detect PsExec With accepteula Flag", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Detect PsExec With accepteula Flag", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "process.name:PsExec.exe and process.args:\"-accepteula\"", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...ne/rules/prepackaged_rules/splunk_detect_use_of_cmdexe_to_launch_script_interpreters.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "f4388e4c-ec3d-41b3-be5c-27c11f61473c", | ||
"risk_score": 50, | ||
"description": "Splunk - Detect Use of cmd.exe to Launch Script Interpreters", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Detect Use of cmd.exe to Launch Script Interpreters", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:(\"wscript.exe\" or \"cscript.exe\") and process.parent.name:\"cmd.exe\"", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...erver/lib/detection_engine/rules/prepackaged_rules/splunk_processes_created_by_netsh.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "ce7a0bde-7406-4729-a075-a215f4571ff6", | ||
"risk_score": 50, | ||
"description": "Splunk - Processes created by netsh", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Processes created by netsh", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "process.parent.name:netsh.exe", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...server/lib/detection_engine/rules/prepackaged_rules/splunk_processes_launching_netsh.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "600dba95-f1c6-4a4d-aae1-c79cbd8a5ddd", | ||
"risk_score": 50, | ||
"description": "Splunk - Processes launching netsh", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Processes launching netsh", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "process.name:netsh.exe and event.action:\"Process Create (rule: ProcessCreate)\" ", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
..._engine/rules/prepackaged_rules/splunk_protocols_passing_authentication_in_cleartext.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "f4442e7f-856a-4a4a-851b-c1f9b97b0d39", | ||
"risk_score": 50, | ||
"description": "Splunk - Protocols passing authentication in cleartext", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Protocols passing authentication in cleartext", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "destination.port:(21 or 23 or 110 or 143) and network.transport:tcp", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |
17 changes: 17 additions & 0 deletions
17
...server/lib/detection_engine/rules/prepackaged_rules/splunk_windows_event_log_cleared.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"rule_id": "c0747553-4652-4e74-bc86-898f2daa2bde", | ||
"risk_score": 50, | ||
"description": "Splunk - Windows Event Log Cleared", | ||
"immutable": true, | ||
"interval": "5m", | ||
"name": "Splunk - Windows Event Log Cleared", | ||
"severity": "low", | ||
"type": "query", | ||
"from": "now-6m", | ||
"to": "now", | ||
"query": "event.code:(1102 or 1100)", | ||
"language": "kuery", | ||
"filters": [], | ||
"enabled": false, | ||
"version": 1 | ||
} |