Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SIEM] version 7.7 rule import #61903

Merged
merged 8 commits into from
Mar 31, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion x-pack/legacy/plugins/siem/cypress/objects/rule.ts
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
* you may not use this file except in compliance with the Elastic License.
*/

export const totalNumberOfPrebuiltRules = 92;
export const totalNumberOfPrebuiltRules = 130;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⭐️


interface Mitre {
tactic: string;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ import { hasListsFeature } from '../../feature_flags';
* - immutable is forbidden but defaults to true instead of to false and it can only ever be true
* - enabled defaults to false instead of true
* - version is a required field that must exist
* - index is a required field that must exist
* - index is a required field that must exist if type !== machine_learning
*/
export const addPrepackagedRulesSchema = Joi.object({
actions: actions.default([]),
Expand All @@ -71,7 +71,11 @@ export const addPrepackagedRulesSchema = Joi.object({
.forbidden()
.default(true)
.valid(true),
index: index.required(),
index: index.when('type', {
is: 'machine_learning',
then: Joi.forbidden(),
otherwise: Joi.required(),
}),
randomuserid marked this conversation as resolved.
Show resolved Hide resolved
interval: interval.default('5m'),
query: query.when('type', {
is: 'machine_learning',
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
"apm-*-transaction*"
],
"language": "kuery",
"max_signals": 100,
"name": "Web Application Suspicious Activity: POST Request Declined",
"query": "http.response.status_code:403 and http.request.method:post",
"references": [
Expand All @@ -17,9 +16,9 @@
"rule_id": "a87a4e42-1d82-44bd-b0bf-d9b7f91fb89e",
"severity": "medium",
"tags": [
"Elastic",
"APM"
"APM",
"Elastic"
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@
"apm-*-transaction*"
],
"language": "kuery",
"max_signals": 100,
"name": "Web Application Suspicious Activity: Unauthorized Method",
"query": "http.response.status_code:405",
"references": [
Expand All @@ -17,9 +16,9 @@
"rule_id": "75ee75d8-c180-481c-ba88-ee50129a6aef",
"severity": "medium",
"tags": [
"Elastic",
"APM"
"APM",
"Elastic"
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Adversary Behavior - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:rules_engine_event",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Dumping - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Dumping - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Manipulation - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Credential Manipulation - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Exploit - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Exploit - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Malware - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:file_classification_event and endgame.metadata.type:detection",
"risk_score": 99,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Malware - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:file_classification_event and endgame.metadata.type:prevention",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Permission Theft - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_protection_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Permission Theft - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:token_protection_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
randomuserid marked this conversation as resolved.
Show resolved Hide resolved
"name": "Process Injection - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:kernel_shellcode_event and endgame.metadata.type:detection",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Process Injection - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:kernel_shellcode_event and endgame.metadata.type:prevention",
"risk_score": 47,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Ransomware - Detected - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:ransomware_event and endgame.metadata.type:detection",
"risk_score": 99,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
],
"interval": "10m",
"language": "kuery",
"max_signals": 100,
"name": "Ransomware - Prevented - Elastic Endpoint",
"query": "event.kind:alert and event.module:endgame and event.action:ransomware_event and endgame.metadata.type:prevention",
"risk_score": 73,
Expand All @@ -18,4 +17,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Adding Hidden File Attribute via Attrib",
"query": " event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"attrib.exe\" and process.args:\"+h\"",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:attrib.exe and process.args:+h",
"risk_score": 21,
"rule_id": "4630d948-40d4-4cef-ac69-4002e29bc3db",
"severity": "low",
Expand Down Expand Up @@ -48,4 +47,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Adobe Hijack Persistence",
"query": "file.path:(\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe\" or \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe\") and event.action:\"File created (rule: FileCreate)\" and not process.name:msiexec.exe",
"risk_score": 21,
Expand Down Expand Up @@ -33,4 +32,4 @@
],
"type": "query",
"version": 2
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Clearing Windows Event Logs",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and (process.name:\"wevtutil.exe\" and process.args:\"cl\") or (process.name:\"powershell.exe\" and process.args:\"Clear-EventLog\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:wevtutil.exe and process.args:cl or process.name:powershell.exe and process.args:Clear-EventLog",
"risk_score": 21,
"rule_id": "d331bbe2-6db4-4941-80a5-8270db72eb61",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Delete Volume USN Journal with Fsutil",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"fsutil.exe\" and process.args:(\"usn\" and \"deletejournal\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:fsutil.exe and process.args:(deletejournal and usn)",
"risk_score": 21,
"rule_id": "f675872f-6d85-40a3-b502-c0d2ef101e92",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@
"winlogbeat-*"
],
"language": "kuery",
"max_signals": 100,
"name": "Deleting Backup Catalogs with Wbadmin",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:\"wbadmin.exe\" and process.args:(\"delete\" and \"catalog\")",
"query": "event.action:\"Process Create (rule: ProcessCreate)\" and process.name:wbadmin.exe and process.args:(catalog and delete)",
"risk_score": 21,
"rule_id": "581add16-df76-42bb-af8e-c979bfb39a59",
"severity": "low",
Expand All @@ -33,4 +32,4 @@
],
"type": "query",
"version": 1
}
}
Loading