Skip to content
This repository has been archived by the owner on Jan 27, 2023. It is now read-only.

[snapshot] Create minimal detection_rules package #843

Closed
wants to merge 3 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions packages/detection_rules/0.0.1-dev.1/docs/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
# Detection rules

The detection rules package is a non-integration package to store all of the rules and dependencies (e.g. ML jobs) for the detection engine within the Elastic Security application.

12 changes: 12 additions & 0 deletions packages/detection_rules/0.0.1-dev.1/kibana/rules/CHANGELOG.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
{
"ce64d965-6cb0-466d-b74f-8d2c76f47f05": {
"1": ["Created \"New ActiveSyncAllowedDeviceID Added via PowerShell\" rule to detect new ActiveSync devices registered via PowerShell."],
},
"a9cb3641-ff4b-4cdc-a063-b4b8d02a67c7": {
"1": ["Created \"IPSEC NAT Traversal Port Activity\" rule to detect IPSEC activity that traverses a NAT"],
"2": ["Added dataset to network rules"],
"3": ["Remove rule timelines"],
"4": ["Add Threat Detection Category"],
"5": ["Remove deprecated ATT&CK technique"]
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{
"author": [
"Elastic"
],
"description": "This rule detects events that could be describing IPSEC NAT Traversal traffic. IPSEC is a VPN technology that allows one system to talk to another using encrypted tunnels. NAT Traversal enables these tunnels to communicate over the Internet where one of the sides is behind a NAT router gateway. This may be common on your network, but this technique is also used by threat actors to avoid detection.",
"false_positives": [
"Some networks may utilize these protocols but usage that is unfamiliar to local network administrators can be unexpected and suspicious. Because this port is in the ephemeral range, this rule may false under certain conditions, such as when an application server with a public IP address replies to a client which has used a UDP port in the range by coincidence. This is uncommon but such servers can be excluded."
],
"index": [
"filebeat-*",
"packetbeat-*",
"logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
"name": "IPSEC NAT Traversal Port Activity",
"query": "event.category:(network or network_traffic) and network.transport:udp and destination.port:4500",
"risk_score": 21,
"rule_id": "a9cb3641-ff4b-4cdc-a063-b4b8d02a67c7",
"severity": "low",
"tags": [
"Elastic",
"Host",
"Network",
"Threat Detection",
"Command and Control"
],
"threat": [
{
"framework": "MITRE ATT&CK",
"tactic": {
"id": "TA0011",
"name": "Command and Control",
"reference": "https://attack.mitre.org/tactics/TA0011/"
},
"technique": []
}
],
"type": "query",
"version": 5
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
{
"author": [
"Elastic"
],
"description": "Identifies the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device. Adversaries may target user email to collect sensitive information.",
"false_positives": [
"Legitimate exchange system administration activity."
],
"index": [
"logs-endpoint.events.*",
"winlogbeat-*"
],
"language": "eql",
"license": "Elastic License",
"name": "New ActiveSyncAllowedDeviceID Added via PowerShell",
"query": "process where event.type in (\"start\", \"process_started\") and\n process.name: (\"powershell.exe\", \"pwsh.exe\") and process.args : \"Set-CASMailbox*ActiveSyncAllowedDeviceIDs*\"\n",
"references": [
"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/",
"https://docs.microsoft.com/en-us/powershell/module/exchange/set-casmailbox?view=exchange-ps"
],
"risk_score": 47,
"rule_id": "ce64d965-6cb0-466d-b74f-8d2c76f47f05",
"severity": "medium",
"tags": [
"Elastic",
"Host",
"Windows",
"Threat Detection",
"Collection"
],
"threat": [
{
"framework": "MITRE ATT&CK",
"tactic": {
"id": "TA0009",
"name": "Collection",
"reference": "https://attack.mitre.org/tactics/TA0009/"
},
"technique": [
{
"id": "T1114",
"name": "Email Collection",
"reference": "https://attack.mitre.org/techniques/T1114/"
}
]
}
],
"type": "eql",
"version": 1
}
17 changes: 17 additions & 0 deletions packages/detection_rules/0.0.1-dev.1/manifest.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
format_version: 1.0.0
name: detection_rules
title: Detection rules
version: 0.0.1-dev.1
license: basic
description: Rules for the detection engine in the Security application.
type: rules
categories:
- security
release: experimental
conditions:
kibana.version: '^7.12.0'
screenshots: []
icons: []
policy_templates: []
owner:
github: elastic/protections