mirror of
https://github.com/elastic/kibana.git
synced 2025-04-23 09:19:04 -04:00
[Detection Rules] Add 7.11 rules (#87422)
* [Detection Rules] Add 7.11 rules * add empty array for missing technique
This commit is contained in:
parent
03ef089236
commit
f12228e635
226 changed files with 2382 additions and 1023 deletions
|
@ -8,14 +8,15 @@
|
|||
],
|
||||
"from": "now-130m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-google_workspace*"
|
||||
],
|
||||
"interval": "10m",
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Application Added to Google Workspace Domain",
|
||||
"note": "### Important Information Regarding Google Workspace Event Lag Times\n- As per Google's documentation, Google Workspace administrators may observe lag times ranging from minutes up to 3 days between the time of an event's occurrence and the event being visible in the Google Workspace admin/audit logs.\n- This rule is configured to run every 10 minutes with a lookback time of 130 minutes.\n- To reduce the risk of false negatives, consider reducing the interval that the Google Workspace (formerly G Suite) Filebeat module polls Google's reporting API for new events.\n- By default, `var.interval` is set to 2 hours (2h). Consider changing this interval to a lower value, such as 10 minutes (10m).\n- See the following references for further information.\n - https://support.google.com/a/answer/7061566\n - https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-gsuite.html",
|
||||
"query": "event.dataset:gsuite.admin and event.provider:admin and event.category:iam and event.action:ADD_APPLICATION",
|
||||
"query": "event.dataset:(gsuite.admin or google_workspace.admin) and event.provider:admin and event.category:iam and event.action:ADD_APPLICATION",
|
||||
"references": [
|
||||
"https://support.google.com/a/answer/6328701?hl=en#"
|
||||
],
|
||||
|
|
|
@ -0,0 +1,50 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "Identifies the use of the Exchange PowerShell cmdlet, New-MailBoxExportRequest, to export the contents of a primary mailbox or archive to a .pst file. Adversaries may target user email to collect sensitive information.",
|
||||
"false_positives": [
|
||||
"Legitimate exchange system administration activity."
|
||||
],
|
||||
"index": [
|
||||
"logs-endpoint.events.*",
|
||||
"winlogbeat-*"
|
||||
],
|
||||
"language": "eql",
|
||||
"license": "Elastic License",
|
||||
"name": "Exporting Exchange Mailbox via PowerShell",
|
||||
"query": "process where event.type in (\"start\", \"process_started\") and\n process.name: (\"powershell.exe\", \"pwsh.exe\") and process.args : \"New-MailboxExportRequest*\"\n",
|
||||
"references": [
|
||||
"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/",
|
||||
"https://docs.microsoft.com/en-us/powershell/module/exchange/new-mailboxexportrequest?view=exchange-ps"
|
||||
],
|
||||
"risk_score": 47,
|
||||
"rule_id": "6aace640-e631-4870-ba8e-5fdda09325db",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Host",
|
||||
"Windows",
|
||||
"Threat Detection",
|
||||
"Collection"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0009",
|
||||
"name": "Collection",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0009/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1114",
|
||||
"name": "Email Collection",
|
||||
"reference": "https://attack.mitre.org/techniques/T1114/"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
}
|
|
@ -7,13 +7,14 @@
|
|||
"Subscription creations may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Subscription creations from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Pub/Sub Subscription Creation",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.pubsub.v*.Subscriber.CreateSubscription and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.pubsub.v*.Subscriber.CreateSubscription and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/pubsub/docs/overview"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Topic creations may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Topic creations from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Pub/Sub Topic Creation",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.pubsub.v*.Publisher.CreateTopic and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.pubsub.v*.Publisher.CreateTopic and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/pubsub/docs/admin"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -0,0 +1,50 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "Identifies the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device. Adversaries may target user email to collect sensitive information.",
|
||||
"false_positives": [
|
||||
"Legitimate exchange system administration activity."
|
||||
],
|
||||
"index": [
|
||||
"logs-endpoint.events.*",
|
||||
"winlogbeat-*"
|
||||
],
|
||||
"language": "eql",
|
||||
"license": "Elastic License",
|
||||
"name": "New ActiveSyncAllowedDeviceID Added via PowerShell",
|
||||
"query": "process where event.type in (\"start\", \"process_started\") and\n process.name: (\"powershell.exe\", \"pwsh.exe\") and process.args : \"Set-CASMailbox*ActiveSyncAllowedDeviceIDs*\"\n",
|
||||
"references": [
|
||||
"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/",
|
||||
"https://docs.microsoft.com/en-us/powershell/module/exchange/set-casmailbox?view=exchange-ps"
|
||||
],
|
||||
"risk_score": 47,
|
||||
"rule_id": "ce64d965-6cb0-466d-b74f-8d2c76f47f05",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Host",
|
||||
"Windows",
|
||||
"Threat Detection",
|
||||
"Collection"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0009",
|
||||
"name": "Collection",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0009/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1114",
|
||||
"name": "Email Collection",
|
||||
"reference": "https://attack.mitre.org/techniques/T1114/"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
}
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Event Hub Authorization Rule Created or Updated",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.EVENTHUB/NAMESPACES/AUTHORIZATIONRULES/WRITE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.EVENTHUB/NAMESPACES/AUTHORIZATIONRULES/WRITE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/event-hubs/authorize-access-shared-access-signature"
|
||||
],
|
||||
|
@ -62,5 +63,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -28,9 +28,9 @@
|
|||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0010",
|
||||
"name": "Exfiltration",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0010/"
|
||||
"id": "TA0009",
|
||||
"name": "Collection",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0009/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
|
@ -42,13 +42,20 @@
|
|||
"reference": "https://attack.mitre.org/techniques/T1071/"
|
||||
},
|
||||
{
|
||||
"id": "T1483",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1483/"
|
||||
"id": "T1568",
|
||||
"name": "Dynamic Resolution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1568.002",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -35,13 +35,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
|
|
|
@ -35,19 +35,26 @@
|
|||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1483",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1483/"
|
||||
},
|
||||
{
|
||||
"id": "T1071",
|
||||
"name": "Application Layer Protocol",
|
||||
"reference": "https://attack.mitre.org/techniques/T1071/"
|
||||
},
|
||||
{
|
||||
"id": "T1568",
|
||||
"name": "Dynamic Resolution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1568.002",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
"reference": "https://attack.mitre.org/techniques/T1071/"
|
||||
},
|
||||
{
|
||||
"id": "T1483",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1483/"
|
||||
"id": "T1568",
|
||||
"name": "Dynamic Resolution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1568.002",
|
||||
"name": "Domain Generation Algorithms",
|
||||
"reference": "https://attack.mitre.org/techniques/T1568/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
|
|
@ -33,15 +33,9 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -37,13 +37,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
@ -62,5 +56,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
|
|
|
@ -33,15 +33,9 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
|
|
@ -47,9 +47,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1086",
|
||||
"name": "PowerShell",
|
||||
"reference": "https://attack.mitre.org/techniques/T1086/"
|
||||
"id": "T1059",
|
||||
"name": "Command and Scripting Interpreter",
|
||||
"reference": "https://attack.mitre.org/techniques/T1059/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1059.001",
|
||||
"name": "PowerShell",
|
||||
"reference": "https://attack.mitre.org/techniques/T1059/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
|
|
|
@ -0,0 +1,76 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "The malware known as SUNBURST targets the SolarWind's Orion business software for command and control. This rule detects post-exploitation command and control activity of the SUNBURST backdoor.",
|
||||
"from": "now-9m",
|
||||
"index": [
|
||||
"logs-endpoint.events.*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "SUNBURST Command and Control Activity",
|
||||
"note": "The SUNBURST malware attempts to hide within the Orion Improvement Program (OIP) network traffic. As this rule detects post-exploitation network traffic, investigations into this should be prioritized.",
|
||||
"query": "event.category:network and event.type:protocol and network.protocol:http and process.name:( ConfigurationWizard.exe or NetFlowService.exe or NetflowDatabaseMaintenance.exe or SolarWinds.Administration.exe or SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe or SolarWinds.Collector.Service.exe or SolarwindsDiagnostics.exe) and http.request.body.content:(( (*/swip/Upload.ashx* and (POST* or PUT*)) or (*/swip/SystemDescription* and (GET* or HEAD*)) or (*/swip/Events* and (GET* or HEAD*))) and not *solarwinds.com*)",
|
||||
"references": [
|
||||
"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html"
|
||||
],
|
||||
"risk_score": 73,
|
||||
"rule_id": "22599847-5d13-48cb-8872-5796fee8692b",
|
||||
"severity": "high",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Host",
|
||||
"Windows",
|
||||
"Threat Detection",
|
||||
"Command and Control"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0011",
|
||||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1071",
|
||||
"name": "Application Layer Protocol",
|
||||
"reference": "https://attack.mitre.org/techniques/T1071/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1071.001",
|
||||
"name": "Web Protocols",
|
||||
"reference": "https://attack.mitre.org/techniques/T1071/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0001",
|
||||
"name": "Initial Access",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0001/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1195",
|
||||
"name": "Supply Chain Compromise",
|
||||
"reference": "https://attack.mitre.org/techniques/T1195/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1195.002",
|
||||
"name": "Compromise Software Supply Chain",
|
||||
"reference": "https://attack.mitre.org/techniques/T1195/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
}
|
|
@ -33,13 +33,7 @@
|
|||
"name": "Command and Control",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
@ -73,5 +67,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -34,11 +34,6 @@
|
|||
"reference": "https://attack.mitre.org/tactics/TA0011/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1043",
|
||||
"name": "Commonly Used Port",
|
||||
"reference": "https://attack.mitre.org/techniques/T1043/"
|
||||
},
|
||||
{
|
||||
"id": "T1090",
|
||||
"name": "Proxy",
|
||||
|
|
|
@ -35,13 +35,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1142",
|
||||
"name": "Keychain",
|
||||
"reference": "https://attack.mitre.org/techniques/T1142/"
|
||||
"id": "T1555",
|
||||
"name": "Credentials from Password Stores",
|
||||
"reference": "https://attack.mitre.org/techniques/T1555/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1555.001",
|
||||
"name": "Keychain",
|
||||
"reference": "https://attack.mitre.org/techniques/T1555/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -37,13 +37,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1145",
|
||||
"name": "Private Keys",
|
||||
"reference": "https://attack.mitre.org/techniques/T1145/"
|
||||
"id": "T1552",
|
||||
"name": "Unsecured Credentials",
|
||||
"reference": "https://attack.mitre.org/techniques/T1552/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1552.004",
|
||||
"name": "Private Keys",
|
||||
"reference": "https://attack.mitre.org/techniques/T1552/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -39,13 +39,7 @@
|
|||
"name": "Credential Access",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0006/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1098",
|
||||
"name": "Account Manipulation",
|
||||
"reference": "https://attack.mitre.org/techniques/T1098/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
|
@ -64,5 +58,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Key Vault Modified",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.KEYVAULT/VAULTS/WRITE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.KEYVAULT/VAULTS/WRITE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/key-vault/general/basic-concepts",
|
||||
"https://docs.microsoft.com/en-us/azure/key-vault/general/secure-your-key-vault"
|
||||
|
@ -40,13 +41,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1081",
|
||||
"name": "Credentials in Files",
|
||||
"reference": "https://attack.mitre.org/techniques/T1081/"
|
||||
"id": "T1552",
|
||||
"name": "Unsecured Credentials",
|
||||
"reference": "https://attack.mitre.org/techniques/T1552/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1552.001",
|
||||
"name": "Credentials In Files",
|
||||
"reference": "https://attack.mitre.org/techniques/T1552/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Storage Account Key Regenerated",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.STORAGE/STORAGEACCOUNTS/REGENERATEKEY/ACTION and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.STORAGE/STORAGEACCOUNTS/REGENERATEKEY/ACTION and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/storage/common/storage-account-keys-manage?tabs=azure-portal"
|
||||
],
|
||||
|
@ -47,5 +48,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -32,9 +32,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1158",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1158/"
|
||||
"id": "T1564",
|
||||
"name": "Hide Artifacts",
|
||||
"reference": "https://attack.mitre.org/techniques/T1564/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1564.001",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1564/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -45,15 +52,9 @@
|
|||
"name": "Persistence",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0003/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1158",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1158/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -35,9 +35,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -0,0 +1,59 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "Identifies when a new credential is added to an application in Azure. An application may use a certificate or secret string to prove its identity when requesting a token. Multiple certificates and secrets can be added for an application and an adversary may abuse this by creating an additional authentication method to evade defenses or persist in an environment.",
|
||||
"false_positives": [
|
||||
"Application credential additions may be done by a system or network administrator. Verify whether the username, hostname, and/or resource name should be making changes in your environment. Application credential additions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Application Credential Modification",
|
||||
"note": "The Azure Fleet Integration or Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.auditlogs and azure.auditlogs.operation_name:\"Update application - Certificates and secrets management\" and event.outcome:(success or Success)",
|
||||
"references": [
|
||||
"https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/"
|
||||
],
|
||||
"risk_score": 47,
|
||||
"rule_id": "1a36cace-11a7-43a8-9a10-b497c5a02cd3",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Cloud",
|
||||
"Azure",
|
||||
"Continuous Monitoring",
|
||||
"SecOps",
|
||||
"Identity and Access"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1550",
|
||||
"name": "Use Alternate Authentication Material",
|
||||
"reference": "https://attack.mitre.org/techniques/T1550/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1550.001",
|
||||
"name": "Application Access Token",
|
||||
"reference": "https://attack.mitre.org/techniques/T1550/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
}
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Diagnostic Settings Deletion",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/DELETE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/DELETE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/azure-monitor/platform/diagnostic-settings"
|
||||
],
|
||||
|
@ -39,13 +40,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -0,0 +1,60 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "Identifies when a new service principal is added in Azure. An application, hosted service, or automated tool that accesses or modifies resources needs an identity created. This identity is known as a service principal. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to log in with a user identity.",
|
||||
"false_positives": [
|
||||
"A service principal may be created by a system or network administrator. Verify whether the username, hostname, and/or resource name should be making changes in your environment. Service principal additions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Service Principal Addition",
|
||||
"note": "The Azure Fleet Integration or Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.auditlogs and azure.auditlogs.operation_name:\"Add service principal\" and event.outcome:(success or Success)",
|
||||
"references": [
|
||||
"https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/",
|
||||
"https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal"
|
||||
],
|
||||
"risk_score": 47,
|
||||
"rule_id": "60b6b72f-0fbc-47e7-9895-9ba7627a8b50",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Cloud",
|
||||
"Azure",
|
||||
"Continuous Monitoring",
|
||||
"SecOps",
|
||||
"Identity and Access"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1550",
|
||||
"name": "Use Alternate Authentication Material",
|
||||
"reference": "https://attack.mitre.org/techniques/T1550/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1550.001",
|
||||
"name": "Application Access Token",
|
||||
"reference": "https://attack.mitre.org/techniques/T1550/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
}
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -30,13 +30,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1116",
|
||||
"name": "Code Signing",
|
||||
"reference": "https://attack.mitre.org/techniques/T1116/"
|
||||
"id": "T1553",
|
||||
"name": "Subvert Trust Controls",
|
||||
"reference": "https://attack.mitre.org/techniques/T1553/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1553.002",
|
||||
"name": "Code Signing",
|
||||
"reference": "https://attack.mitre.org/techniques/T1553/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 3
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1146",
|
||||
"name": "Clear Command History",
|
||||
"reference": "https://attack.mitre.org/techniques/T1146/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.003",
|
||||
"name": "Clear Command History",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/003/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 3
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -44,13 +44,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -32,9 +32,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Event Hub Deletion",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.EVENTHUB/NAMESPACES/EVENTHUBS/DELETE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.EVENTHUB/NAMESPACES/EVENTHUBS/DELETE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/event-hubs/event-hubs-about",
|
||||
"https://azure.microsoft.com/en-in/services/event-hubs/",
|
||||
|
@ -41,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -51,15 +51,9 @@
|
|||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1127",
|
||||
"name": "Trusted Developer Utilities Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1127/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -48,15 +48,9 @@
|
|||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1127",
|
||||
"name": "Trusted Developer Utilities Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1127/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -48,15 +48,9 @@
|
|||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1127",
|
||||
"name": "Trusted Developer Utilities Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1127/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -38,13 +38,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1500",
|
||||
"name": "Compile After Delivery",
|
||||
"reference": "https://attack.mitre.org/techniques/T1500/"
|
||||
"id": "T1027",
|
||||
"name": "Obfuscated Files or Information",
|
||||
"reference": "https://attack.mitre.org/techniques/T1027/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1027.004",
|
||||
"name": "Compile After Delivery",
|
||||
"reference": "https://attack.mitre.org/techniques/T1027/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -47,15 +47,9 @@
|
|||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1127",
|
||||
"name": "Trusted Developer Utilities Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1127/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Firewall Policy Deletion",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.NETWORK/FIREWALLPOLICIES/DELETE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.NETWORK/FIREWALLPOLICIES/DELETE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/firewall-manager/policy-overview"
|
||||
],
|
||||
|
@ -39,13 +40,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Firewall rules may be created by system administrators. Verify that the firewall configuration change was expected. Exceptions can be added to this rule to filter expected behavior."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Firewall Rule Creation",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:v*.compute.firewalls.insert",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:v*.compute.firewalls.insert",
|
||||
"references": [
|
||||
"https://cloud.google.com/vpc/docs/firewalls"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Firewall rules may be deleted by system administrators. Verify that the firewall configuration change was expected. Exceptions can be added to this rule to filter expected behavior."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Firewall Rule Deletion",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:v*.compute.firewalls.delete",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:v*.compute.firewalls.delete",
|
||||
"references": [
|
||||
"https://cloud.google.com/vpc/docs/firewalls"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Firewall rules may be modified by system administrators. Verify that the firewall configuration change was expected. Exceptions can be added to this rule to filter expected behavior."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Firewall Rule Modification",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:v*.compute.firewalls.patch",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:v*.compute.firewalls.patch",
|
||||
"references": [
|
||||
"https://cloud.google.com/vpc/docs/firewalls"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Logging bucket deletions may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Logging bucket deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Logging Bucket Deletion",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.logging.v*.ConfigServiceV*.DeleteBucket and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.logging.v*.ConfigServiceV*.DeleteBucket and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/logging/docs/buckets",
|
||||
"https://cloud.google.com/logging/docs/storage"
|
||||
|
@ -47,5 +48,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Logging sink deletions may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Logging sink deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Logging Sink Deletion",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.logging.v*.ConfigServiceV*.DeleteSink and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.logging.v*.ConfigServiceV*.DeleteSink and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/logging/docs/export"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Subscription deletions may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Subscription deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Pub/Sub Subscription Deletion",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.pubsub.v*.Subscriber.DeleteSubscription and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.pubsub.v*.Subscriber.DeleteSubscription and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/pubsub/docs/overview"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Topic deletions may be done by a system or network administrator. Verify whether the user email, resource name, and/or hostname should be making changes in your environment. Topic deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Pub/Sub Topic Deletion",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:google.pubsub.v*.Publisher.DeleteTopic and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:google.pubsub.v*.Publisher.DeleteTopic and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/pubsub/docs/overview"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Storage bucket configuration may be modified by system administrators. Verify that the configuration change was expected. Exceptions can be added to this rule to filter expected behavior."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Storage Bucket Configuration Modification",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:storage.buckets.update and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:storage.buckets.update and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/storage/docs/key-terms#buckets"
|
||||
],
|
||||
|
@ -29,5 +30,5 @@
|
|||
"Identity and Access"
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -7,13 +7,14 @@
|
|||
"Storage bucket permissions may be modified by system administrators. Verify that the configuration change was expected. Exceptions can be added to this rule to filter expected behavior."
|
||||
],
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-gcp*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "GCP Storage Bucket Permissions Modification",
|
||||
"note": "The GCP Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:googlecloud.audit and event.action:storage.setIamPermissions and event.outcome:success",
|
||||
"query": "event.dataset:(googlecloud.audit or gcp.audit) and event.action:storage.setIamPermissions and event.outcome:success",
|
||||
"references": [
|
||||
"https://cloud.google.com/storage/docs/access-control/iam-permissions"
|
||||
],
|
||||
|
@ -46,5 +47,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -36,9 +36,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1158",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1158/"
|
||||
"id": "T1564",
|
||||
"name": "Hide Artifacts",
|
||||
"reference": "https://attack.mitre.org/techniques/T1564/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1564.001",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1564/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -49,15 +56,9 @@
|
|||
"name": "Persistence",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0003/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1158",
|
||||
"name": "Hidden Files and Directories",
|
||||
"reference": "https://attack.mitre.org/techniques/T1158/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 3
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1118",
|
||||
"name": "InstallUtil",
|
||||
"reference": "https://attack.mitre.org/techniques/T1118/"
|
||||
"id": "T1218",
|
||||
"name": "Signed Binary Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1218.004",
|
||||
"name": "InstallUtil",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -38,9 +38,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,13 +60,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1215",
|
||||
"name": "Kernel Modules and Extensions",
|
||||
"reference": "https://attack.mitre.org/techniques/T1215/"
|
||||
"id": "T1547",
|
||||
"name": "Boot or Logon Autostart Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1547/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1547.006",
|
||||
"name": "Kernel Modules and Extensions",
|
||||
"reference": "https://attack.mitre.org/techniques/T1547/006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -8,7 +8,8 @@
|
|||
],
|
||||
"from": "now-30m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-o365*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
|
|
|
@ -45,15 +45,9 @@
|
|||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1218",
|
||||
"name": "Signed Binary Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -26,9 +26,9 @@
|
|||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0002",
|
||||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
|
@ -40,5 +40,5 @@
|
|||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1170",
|
||||
"name": "Mshta",
|
||||
"reference": "https://attack.mitre.org/techniques/T1170/"
|
||||
"id": "T1218",
|
||||
"name": "Signed Binary Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1218.005",
|
||||
"name": "Mshta",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/005/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -26,9 +26,9 @@
|
|||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0002",
|
||||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
|
@ -40,5 +40,5 @@
|
|||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 4
|
||||
"version": 5
|
||||
}
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Network Watcher Deletion",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.NETWORK/NETWORKWATCHERS/DELETE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.NETWORK/NETWORKWATCHERS/DELETE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview"
|
||||
],
|
||||
|
@ -39,13 +40,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -35,9 +35,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -32,9 +32,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1085",
|
||||
"name": "Rundll32",
|
||||
"reference": "https://attack.mitre.org/techniques/T1085/"
|
||||
"id": "T1218",
|
||||
"name": "Signed Binary Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1218.011",
|
||||
"name": "Rundll32",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/011/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -35,9 +35,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -33,9 +33,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -0,0 +1,76 @@
|
|||
{
|
||||
"author": [
|
||||
"Elastic"
|
||||
],
|
||||
"description": "Identifies a SolarWinds binary modifying the start type of a service to be disabled. An adversary may abuse this technique to manipulate relevant security services.",
|
||||
"from": "now-9m",
|
||||
"index": [
|
||||
"winlogbeat-*",
|
||||
"logs-endpoint.events.*"
|
||||
],
|
||||
"language": "eql",
|
||||
"license": "Elastic License",
|
||||
"name": "SolarWinds Process Disabling Services via Registry",
|
||||
"query": "registry where registry.path : \"HKLM\\\\SYSTEM\\\\*ControlSet*\\\\Services\\\\*\\\\Start\" and registry.data.strings == \"4\" and\n process.name : (\n \"SolarWinds.BusinessLayerHost*.exe\", \n \"ConfigurationWizard*.exe\", \n \"NetflowDatabaseMaintenance*.exe\", \n \"NetFlowService*.exe\", \n \"SolarWinds.Administration*.exe\", \n \"SolarWinds.Collector.Service*.exe\" , \n \"SolarwindsDiagnostics*.exe\")\n",
|
||||
"references": [
|
||||
"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html"
|
||||
],
|
||||
"risk_score": 47,
|
||||
"rule_id": "b9960fef-82c6-4816-befa-44745030e917",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
"Elastic",
|
||||
"Host",
|
||||
"Windows",
|
||||
"Threat Detection",
|
||||
"Defense Evasion"
|
||||
],
|
||||
"threat": [
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0001",
|
||||
"name": "Initial Access",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0001/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1195",
|
||||
"name": "Supply Chain Compromise",
|
||||
"reference": "https://attack.mitre.org/techniques/T1195/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1195.002",
|
||||
"name": "Compromise Software Supply Chain",
|
||||
"reference": "https://attack.mitre.org/techniques/T1195/002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
}
|
|
@ -32,9 +32,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -30,15 +30,9 @@
|
|||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1064",
|
||||
"name": "Scripting",
|
||||
"reference": "https://attack.mitre.org/techniques/T1064/"
|
||||
}
|
||||
]
|
||||
"technique": []
|
||||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -34,9 +34,16 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1099",
|
||||
"name": "Timestomp",
|
||||
"reference": "https://attack.mitre.org/techniques/T1099/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.006",
|
||||
"name": "Timestomp",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -13,7 +13,6 @@
|
|||
"name": "Unusual Network Connection via RunDLL32",
|
||||
"query": "sequence by host.id, process.entity_id with maxspan=1m\n [process where event.type in (\"start\", \"process_started\", \"info\") and process.name : \"rundll32.exe\" and process.args_count == 1]\n [network where process.name : \"rundll32.exe\" and network.protocol != \"dns\" and network.direction == \"outgoing\" and\n not cidrmatch(destination.ip, \"10.0.0.0/8\", \"172.16.0.0/12\", \"192.168.0.0/16\", \"127.0.0.0/8\")]\n",
|
||||
"risk_score": 47,
|
||||
|
||||
"rule_id": "52aaab7b-b51c-441a-89ce-4387b3aea886",
|
||||
"severity": "medium",
|
||||
"tags": [
|
||||
|
@ -27,15 +26,22 @@
|
|||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0002",
|
||||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1085",
|
||||
"name": "Rundll32",
|
||||
"reference": "https://attack.mitre.org/techniques/T1085/"
|
||||
"id": "T1218",
|
||||
"name": "Signed Binary Proxy Execution",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1218.011",
|
||||
"name": "Rundll32",
|
||||
"reference": "https://attack.mitre.org/techniques/T1218/011/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
|
@ -26,9 +26,9 @@
|
|||
{
|
||||
"framework": "MITRE ATT&CK",
|
||||
"tactic": {
|
||||
"id": "TA0002",
|
||||
"name": "Execution",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0002/"
|
||||
"id": "TA0005",
|
||||
"name": "Defense Evasion",
|
||||
"reference": "https://attack.mitre.org/tactics/TA0005/"
|
||||
},
|
||||
"technique": [
|
||||
{
|
||||
|
@ -40,5 +40,5 @@
|
|||
}
|
||||
],
|
||||
"type": "eql",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
|
@ -32,13 +32,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1107",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1107/"
|
||||
"id": "T1070",
|
||||
"name": "Indicator Removal on Host",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1070.004",
|
||||
"name": "File Deletion",
|
||||
"reference": "https://attack.mitre.org/techniques/T1070/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 5
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -42,13 +42,20 @@
|
|||
},
|
||||
"technique": [
|
||||
{
|
||||
"id": "T1089",
|
||||
"name": "Disabling Security Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1089/"
|
||||
"id": "T1562",
|
||||
"name": "Impair Defenses",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/",
|
||||
"subtechnique": [
|
||||
{
|
||||
"id": "T1562.001",
|
||||
"name": "Disable or Modify Tools",
|
||||
"reference": "https://attack.mitre.org/techniques/T1562/001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -8,13 +8,14 @@
|
|||
],
|
||||
"from": "now-25m",
|
||||
"index": [
|
||||
"filebeat-*"
|
||||
"filebeat-*",
|
||||
"logs-azure*"
|
||||
],
|
||||
"language": "kuery",
|
||||
"license": "Elastic License",
|
||||
"name": "Azure Blob Container Access Level Modification",
|
||||
"note": "The Azure Filebeat module must be enabled to use this rule.",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.STORAGE/STORAGEACCOUNTS/BLOBSERVICES/CONTAINERS/WRITE and event.outcome:Success",
|
||||
"query": "event.dataset:azure.activitylogs and azure.activitylogs.operation_name:MICROSOFT.STORAGE/STORAGEACCOUNTS/BLOBSERVICES/CONTAINERS/WRITE and event.outcome:(Success or success)",
|
||||
"references": [
|
||||
"https://docs.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent"
|
||||
],
|
||||
|
@ -62,5 +63,5 @@
|
|||
}
|
||||
],
|
||||
"type": "query",
|
||||
"version": 1
|
||||
"version": 2
|
||||
}
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue