forked from elastic/detection-rules
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update cardinality field in schema for threshold rules (elastic#1349)
* Make cardinality array in schema for threshold rules * update master, 7.12, 7.13, and 7.14 schemas with cardinality fix * fix 7.12 downgrade to handle cardinality as an array * Add two new rules to detect agent spoofing Co-authored-by: Ross Wolf <[email protected]>
- Loading branch information
1 parent
95e6458
commit 163d9e3
Showing
13 changed files
with
216 additions
and
72 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -9,4 +9,4 @@ | |
|
||
"7.14.0": | ||
beats: "master" # TODO: 7.14.x | ||
ecs: "1.10.0" | ||
ecs: "master" # TODO: master came out after 7.13.0 release |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
48 changes: 48 additions & 0 deletions
48
rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
[metadata] | ||
creation_date = "2021/07/14" | ||
maturity = "production" | ||
updated_date = "2021/07/14" | ||
min_stack_version = "7.14.0" | ||
|
||
[rule] | ||
author = ["Elastic"] | ||
description = """Detects events which have a mismatch on the expected event agent ID. The status "agent_id_mismatch" | ||
occurs when the expected agent ID associated with the API key does not match the actual agent ID in an event. This could | ||
indicate attempts to spoof events in order to masquerade actual activity to evade detection. | ||
""" | ||
false_positives = [ | ||
""" | ||
This is meant to run only on datasources using agents v7.14+ since versions prior to that will be missing the | ||
necessary field, resulting in false positives. | ||
""", | ||
] | ||
from = "now-9m" | ||
index = ["logs-*", "metrics-*", "traces-*"] | ||
language = "kuery" | ||
license = "Elastic License v2" | ||
name = "Agent Spoofing - Mismatched Agent ID" | ||
risk_score = 73 | ||
rule_id = "3115bd2c-0baa-4df0-80ea-45e474b5ef93" | ||
severity = "high" | ||
tags = ["Elastic", "Threat Detection", "Defense Evasion"] | ||
timestamp_override = "event.ingested" | ||
type = "query" | ||
|
||
query = ''' | ||
event.agent_id_status:agent_id_mismatch | ||
''' | ||
|
||
|
||
[[rule.threat]] | ||
framework = "MITRE ATT&CK" | ||
[[rule.threat.technique]] | ||
id = "T1036" | ||
name = "Masquerading" | ||
reference = "https://attack.mitre.org/techniques/T1036/" | ||
|
||
|
||
[rule.threat.tactic] | ||
id = "TA0005" | ||
name = "Defense Evasion" | ||
reference = "https://attack.mitre.org/tactics/TA0005/" | ||
|
Oops, something went wrong.