Skip to content

Commit 5ad866f

Browse files
[Security Rules] Update security rules package to v8.4.1 (#4740)
1 parent 3e9c5e9 commit 5ad866f

File tree

344 files changed

+3314
-933
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

344 files changed

+3314
-933
lines changed

packages/security_detection_engine/changelog.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
# NOTE: please use pre-release versions (e.g. -dev.0) until a package is ready for production
33
- changes:
44
- description: Release security rules update
5-
link: https://github.com/elastic/integrations/pull/4377
5+
link: https://github.com/elastic/integrations/pull/4740
66
type: enhancement
7-
version: 8.3.2
7+
version: 8.4.1
88
- changes:
99
- description: Release security rules update
1010
link: https://github.com/elastic/integrations/pull/4063
@@ -89,10 +89,12 @@
8989
- description: Fix package for 7.13.0 from detection-rules
9090
link: https://github.com/elastic/integrations/pull/1127
9191
type: bugfix
92+
version: 0.13.0
93+
- changes:
9294
- description: Publish package for 7.13.0 from detection-rules
9395
link: https://github.com/elastic/integrations/pull/1126
9496
type: enhancement
95-
version: 0.13.0
97+
version: 0.13.0-dev.0
9698
- changes:
9799
- description: Fix security rules naming
98100
link: https://github.com/elastic/integrations/pull/987

packages/security_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@
1919
"references": [
2020
"https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm",
2121
"https://developer.okta.com/docs/reference/api/system-log/",
22-
"https://developer.okta.com/docs/reference/api/event-types/"
22+
"https://developer.okta.com/docs/reference/api/event-types/",
23+
"https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"
2324
],
2425
"related_integrations": [
2526
{
@@ -78,7 +79,7 @@
7879
],
7980
"timestamp_override": "event.ingested",
8081
"type": "query",
81-
"version": 101
82+
"version": 102
8283
},
8384
"id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19",
8485
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/00140285-b827-4aee-aa09-8113f58a08f3.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@
88
"index": [
99
"winlogbeat-*",
1010
"logs-endpoint.events.*",
11-
"logs-windows.*"
11+
"logs-windows.*",
12+
"endgame-*"
1213
],
1314
"language": "eql",
1415
"license": "Elastic License v2",
@@ -60,7 +61,8 @@
6061
"Windows",
6162
"Threat Detection",
6263
"Credential Access",
63-
"has_guide"
64+
"Investigation Guide",
65+
"Elastic Endgame"
6466
],
6567
"threat": [
6668
{
@@ -93,7 +95,7 @@
9395
],
9496
"timestamp_override": "event.ingested",
9597
"type": "eql",
96-
"version": 101
98+
"version": 102
9799
},
98100
"id": "00140285-b827-4aee-aa09-8113f58a08f3",
99101
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/0022d47d-39c7-4f69-a232-4fe9dc7a3acd.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
"Windows",
4848
"Threat Detection",
4949
"Persistence",
50-
"has_guide"
50+
"Investigation Guide"
5151
],
5252
"threat": [
5353
{
@@ -75,7 +75,7 @@
7575
],
7676
"timestamp_override": "event.ingested",
7777
"type": "eql",
78-
"version": 101
78+
"version": 102
7979
},
8080
"id": "0022d47d-39c7-4f69-a232-4fe9dc7a3acd",
8181
"type": "security-rule"
Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
{
2+
"attributes": {
3+
"author": [
4+
"Elastic"
5+
],
6+
"description": "Identifies the creation of a process running as SYSTEM and impersonating a Windows core binary privileges. Adversaries may create a new process with a different token to escalate privileges and bypass access controls.",
7+
"from": "now-9m",
8+
"index": [
9+
"logs-endpoint.events.*"
10+
],
11+
"language": "eql",
12+
"license": "Elastic License v2",
13+
"name": "Process Created with an Elevated Token",
14+
"query": "/* This rule is only compatible with Elastic Endpoint 8.4+ */\n\nprocess where event.action == \"start\" and\n\n /* CreateProcessWithToken and effective parent is a privileged MS native binary used as a target for token theft */\n user.id : \"S-1-5-18\" and\n\n /* Token Theft target process usually running as service are located in one of the following paths */\n process.Ext.effective_parent.executable :\n (\"?:\\\\Windows\\\\*.exe\",\n \"?:\\\\Program Files\\\\*.exe\",\n \"?:\\\\Program Files (x86)\\\\*.exe\",\n \"?:\\\\ProgramData\\\\*\") and\n\n not (process.Ext.effective_parent.executable : \"?:\\\\Windows\\\\System32\\\\Utilman.exe\" and\n process.parent.executable : \"?:\\\\Windows\\\\System32\\\\Utilman.exe\" and process.parent.args : \"/debug\") and\n\n not process.executable : (\"?:\\\\Windows\\\\System32\\\\WerFault.exe\",\n \"?:\\\\Windows\\\\SysWOW64\\\\WerFault.exe\",\n \"?:\\\\Windows\\\\System32\\\\WerFaultSecure.exe\",\n \"?:\\\\Windows\\\\SysWOW64\\\\WerFaultSecure.exe\",\n \"?:\\\\windows\\\\system32\\\\WerMgr.exe\",\n \"?:\\\\Windows\\\\SoftwareDistribution\\\\Download\\\\Install\\\\securityhealthsetup.exe\") and\n\n not process.parent.executable : (\"?:\\\\Windows\\\\System32\\\\AtBroker.exe\", \"?:\\\\Windows\\\\system32\\\\svchost.exe\", \"?:\\\\Program Files (x86)\\\\*.exe\", \"?:\\\\Program Files\\\\*.exe\", \"?:\\\\Windows\\\\System32\\\\msiexec.exe\",\n \"C:\\\\Windows\\\\System32\\\\DriverStore\\\\*\") and\n\n\n not (process.code_signature.trusted == true and\n process.code_signature.subject_name in (\"philandro Software GmbH\", \"Freedom Scientific Inc.\", \"TeamViewer Germany GmbH\", \"Projector.is, Inc.\", \"TeamViewer GmbH\", \"Cisco WebEx LLC\", \"Dell Inc\"))\n",
15+
"references": [
16+
"https://lengjibo.github.io/token/",
17+
"https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-createprocesswithtokenw"
18+
],
19+
"required_fields": [
20+
{
21+
"ecs": true,
22+
"name": "event.action",
23+
"type": "keyword"
24+
},
25+
{
26+
"ecs": false,
27+
"name": "process.Ext.effective_parent.executable",
28+
"type": "unknown"
29+
},
30+
{
31+
"ecs": true,
32+
"name": "process.code_signature.subject_name",
33+
"type": "keyword"
34+
},
35+
{
36+
"ecs": true,
37+
"name": "process.code_signature.trusted",
38+
"type": "boolean"
39+
},
40+
{
41+
"ecs": true,
42+
"name": "process.executable",
43+
"type": "keyword"
44+
},
45+
{
46+
"ecs": true,
47+
"name": "process.parent.args",
48+
"type": "keyword"
49+
},
50+
{
51+
"ecs": true,
52+
"name": "process.parent.executable",
53+
"type": "keyword"
54+
},
55+
{
56+
"ecs": true,
57+
"name": "user.id",
58+
"type": "keyword"
59+
}
60+
],
61+
"risk_score": 73,
62+
"rule_id": "02a23ee7-c8f8-4701-b99d-e9038ce313cb",
63+
"severity": "high",
64+
"tags": [
65+
"Elastic",
66+
"Host",
67+
"Windows",
68+
"Threat Detection",
69+
"Privilege Escalation"
70+
],
71+
"threat": [
72+
{
73+
"framework": "MITRE ATT\u0026CK",
74+
"tactic": {
75+
"id": "TA0004",
76+
"name": "Privilege Escalation",
77+
"reference": "https://attack.mitre.org/tactics/TA0004/"
78+
},
79+
"technique": [
80+
{
81+
"id": "T1134",
82+
"name": "Access Token Manipulation",
83+
"reference": "https://attack.mitre.org/techniques/T1134/",
84+
"subtechnique": [
85+
{
86+
"id": "T1134.002",
87+
"name": "Create Process with Token",
88+
"reference": "https://attack.mitre.org/techniques/T1134/002/"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
95+
"timestamp_override": "event.ingested",
96+
"type": "eql",
97+
"version": 1
98+
},
99+
"id": "02a23ee7-c8f8-4701-b99d-e9038ce313cb",
100+
"type": "security-rule"
101+
}

packages/security_detection_engine/kibana/security_rule/02a4576a-7480-4284-9327-548a806b5e48.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,8 @@
4848
"Host",
4949
"Windows",
5050
"Threat Detection",
51-
"Credential Access"
51+
"Credential Access",
52+
"Sysmon Only"
5253
],
5354
"threat": [
5455
{
@@ -76,7 +77,7 @@
7677
],
7778
"timestamp_override": "event.ingested",
7879
"type": "eql",
79-
"version": 100
80+
"version": 101
8081
},
8182
"id": "02a4576a-7480-4284-9327-548a806b5e48",
8283
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/035889c4-2686-4583-a7df-67f89c292f2c.json

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@
1515
"name": "High Number of Process and/or Service Terminations",
1616
"note": "## Triage and analysis\n\n### Investigating High Number of Process and/or Service Terminations\n\nAttackers can stop services and kill processes for a variety of purposes. For example, they can stop services associated\nwith business applications and databases to release the lock on files used by these applications so they may be encrypted,\nor stop security and backup solutions, etc.\n\nThis rule identifies a high number (10) of service and/or process terminations (stop, delete, or suspend) from the same\nhost within a short time period.\n\n#### Possible investigation steps\n\n- Investigate the script execution chain (parent process tree) for unknown processes. Examine their executable files for\nprevalence, whether they are located in expected locations, and if they are signed with valid digital signatures.\n- Identify the user account that performed the action and whether it should perform this kind of action.\n- Contact the account owner and confirm whether they are aware of this activity.\n- Investigate other alerts associated with the user/host during the past 48 hours.\n- Check if any files on the host machine have been encrypted.\n\n### False positive analysis\n\n- This activity is unlikely to happen legitimately. Benign true positives (B-TPs) can be added as exceptions if necessary.\n\n### Response and remediation\n\n- Initiate the incident response process based on the outcome of the triage.\n- Isolate the involved host to prevent further destructive behavior, which is commonly associated with this activity.\n- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are\nidentified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business\nsystems, and web services.\n- Reimage the host operating system or restore it to the operational state.\n- If any other destructive action was identified on the host, it is recommended to prioritize the investigation and look\nfor ransomware preparation and execution activities.\n- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and\nmalware components.\n- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.\n- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the\nmean time to respond (MTTR).\n",
1717
"query": "event.category:process and event.type:start and process.name:(net.exe or sc.exe or taskkill.exe) and\n process.args:(stop or pause or delete or \"/PID\" or \"/IM\" or \"/T\" or \"/F\" or \"/t\" or \"/f\" or \"/im\" or \"/pid\")\n",
18+
"references": [
19+
"https://www.elastic.co/security-labs/luna-ransomware-attack-pattern"
20+
],
1821
"required_fields": [
1922
{
2023
"ecs": true,
@@ -46,7 +49,7 @@
4649
"Windows",
4750
"Threat Detection",
4851
"Impact",
49-
"has_guide"
52+
"Investigation Guide"
5053
],
5154
"threat": [
5255
{
@@ -72,7 +75,7 @@
7275
"value": 10
7376
},
7477
"type": "threshold",
75-
"version": 101
78+
"version": 102
7679
},
7780
"id": "035889c4-2686-4583-a7df-67f89c292f2c",
7881
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/053a0387-f3b5-4ba5-8245-8002cca2bd08.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@
1212
"index": [
1313
"winlogbeat-*",
1414
"logs-endpoint.events.*",
15-
"logs-windows.*"
15+
"logs-windows.*",
16+
"endgame-*"
1617
],
1718
"language": "eql",
1819
"license": "Elastic License v2",
@@ -53,7 +54,8 @@
5354
"Host",
5455
"Windows",
5556
"Threat Detection",
56-
"Defense Evasion"
57+
"Defense Evasion",
58+
"Elastic Endgame"
5759
],
5860
"threat": [
5961
{
@@ -81,7 +83,7 @@
8183
],
8284
"timestamp_override": "event.ingested",
8385
"type": "eql",
84-
"version": 100
86+
"version": 101
8587
},
8688
"id": "053a0387-f3b5-4ba5-8245-8002cca2bd08",
8789
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/0564fb9d-90b9-4234-a411-82a546dc1343.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@
88
"index": [
99
"winlogbeat-*",
1010
"logs-endpoint.events.*",
11-
"logs-windows.*"
11+
"logs-windows.*",
12+
"endgame-*"
1213
],
1314
"language": "eql",
1415
"license": "Elastic License v2",
@@ -50,7 +51,8 @@
5051
"Host",
5152
"Windows",
5253
"Threat Detection",
53-
"Credential Access"
54+
"Credential Access",
55+
"Elastic Endgame"
5456
],
5557
"threat": [
5658
{
@@ -71,7 +73,7 @@
7173
],
7274
"timestamp_override": "event.ingested",
7375
"type": "eql",
74-
"version": 101
76+
"version": 102
7577
},
7678
"id": "0564fb9d-90b9-4234-a411-82a546dc1343",
7779
"type": "security-rule"

packages/security_detection_engine/kibana/security_rule/05b358de-aa6d-4f6c-89e6-78f74018b43b.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@
88
"index": [
99
"winlogbeat-*",
1010
"logs-endpoint.events.*",
11-
"logs-windows.*"
11+
"logs-windows.*",
12+
"endgame-*"
1213
],
1314
"language": "eql",
1415
"license": "Elastic License v2",
@@ -50,7 +51,8 @@
5051
"Windows",
5152
"Threat Detection",
5253
"Execution",
53-
"has_guide"
54+
"Investigation Guide",
55+
"Elastic Endgame"
5456
],
5557
"threat": [
5658
{
@@ -71,7 +73,7 @@
7173
],
7274
"timestamp_override": "event.ingested",
7375
"type": "eql",
74-
"version": 101
76+
"version": 102
7577
},
7678
"id": "05b358de-aa6d-4f6c-89e6-78f74018b43b",
7779
"type": "security-rule"

0 commit comments

Comments
 (0)