Skip to content

Commit 01191d2

Browse files
Merge branch 'main' into esql-field-validation
2 parents 6f018b5 + d9151c3 commit 01191d2

File tree

117 files changed

+2013
-922
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

117 files changed

+2013
-922
lines changed

detection_rules/etc/custom-consolidated-rules.ndjson

Lines changed: 15 additions & 0 deletions
Large diffs are not rendered by default.

detection_rules/etc/non-ecs-schema.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
"TargetLogonId": "keyword",
4444
"TargetProcessGUID": "keyword",
4545
"TargetSid": "keyword",
46-
"SchemaFriendlyName": "keyword",
46+
"SchemaFriendlyName": "keyword",
4747
"Resource": "keyword",
4848
"RpcCallClientLocality": "keyword",
4949
"PrivilegeList": "keyword",
@@ -207,5 +207,17 @@
207207
"logs-okta*": {
208208
"okta.debug_context.debug_data.flattened.requestedScopes": "keyword",
209209
"okta.debug_context.debug_data.flattened.grantType": "keyword"
210+
},
211+
"logs-network_traffic.http*": {
212+
"data_stream.dataset": "keyword",
213+
"url.path": "keyword",
214+
"http.request.referrer": "keyword",
215+
"http.request.headers.content-type": "keyword",
216+
"network.direction": "keyword",
217+
"http.request.method": "keyword",
218+
"request": "keyword",
219+
"http.request.body.bytes": "long",
220+
"http.request.body.content": "keyword",
221+
"http.response.headers.server": "keyword"
210222
}
211223
}

detection_rules/etc/test_remote_cli.bash

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,23 @@ echo "Performing a quick rule alerts search..."
1212
echo "Requires .detection-rules-cfg.json credentials file set."
1313
python -m detection_rules kibana search-alerts
1414

15-
echo "Performing a rule export..."
16-
mkdir tmp-export 2>/dev/null
17-
python -m detection_rules kibana export-rules -d tmp-export -sv --skip-errors -r 565d6ca5-75ba-4c82-9b13-add25353471c
18-
ls tmp-export
19-
echo "Removing generated files..."
20-
rm -rf tmp-export
15+
echo "Setting Up Custom Directory..."
16+
mkdir tmp-custom 2>/dev/null
17+
python -m detection_rules custom-rules setup-config tmp-custom
18+
export CUSTOM_RULES_DIR=./tmp-custom/
2119

22-
echo "Performing a rule import..."
20+
echo "Performing a rule conversion from ndjson to toml files..."
21+
python -m detection_rules import-rules-to-repo detection_rules/etc/custom-consolidated-rules.ndjson -ac -e -s $CUSTOM_RULES_DIR/rules --required-only
22+
23+
echo "Performing a rule import to kibana..."
2324

24-
python -m detection_rules custom-rules setup-config tmp-custom
25-
export CUSTOM_RULES_DIR=./tmp-custom
26-
cp rules/threat_intel/threat_intel_indicator_match_address.toml tmp-custom/rules/
2725
python -m detection_rules kibana import-rules -o -e -ac
28-
rm -rf tmp-custom
26+
27+
echo "Performing a rule export..."
28+
python -m detection_rules kibana export-rules -d $CUSTOM_RULES_DIR -ac -e -sv --custom-rules-only
29+
30+
echo "Removing generated files..."
31+
rm -rf $CUSTOM_RULES_DIR
2932
set -e CUSTOM_RULES_DIR
3033

3134
echo "Detection-rules Remote CLI tests completed!"

detection_rules/etc/test_toml.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,14 @@
4848
]
4949
}
5050
},
51+
{
52+
"metadata": {
53+
"field": "value"
54+
},
55+
"rule": {
56+
"path": "?:\\\\Windows\\\\Sys?????\\\\x5lrs.dll"
57+
}
58+
},
5159
{
5260
"metadata": {
5361
"field": "value"

detection_rules/etc/version.lock.json

Lines changed: 53 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -510,10 +510,10 @@
510510
"version": 4
511511
},
512512
"0d3d2254-2b4a-11f0-a019-f661ea17fbcc": {
513-
"rule_name": "Microsoft Entra ID Session Reuse with Suspicious Graph Access",
514-
"sha256": "2ff9a11a69b39d114739b56e1264c1c56b7fa7879955c39fc95314719ddfd722",
513+
"rule_name": "Microsoft Entra ID Suspicious Session Reuse to Graph Access",
514+
"sha256": "5d51cd77e355a15effce25681d7c34951a0d647ed54067f8a00cecb2d06c3894",
515515
"type": "esql",
516-
"version": 3
516+
"version": 4
517517
},
518518
"0d69150b-96f8-467c-a86d-a67a3378ce77": {
519519
"rule_name": "Nping Process Activity",
@@ -1303,9 +1303,9 @@
13031303
},
13041304
"203ab79b-239b-4aa5-8e54-fc50623ee8e4": {
13051305
"rule_name": "Creation or Modification of Root Certificate",
1306-
"sha256": "a029643dc698af540c0359ee8ad1f382db3e999941b3514b9d07b2561ee7140c",
1306+
"sha256": "cb97ac512379616b3ee47f87a9d7a7f6cdc27f77c1aeb2207f6fa1bbc5fa06af",
13071307
"type": "eql",
1308-
"version": 313
1308+
"version": 314
13091309
},
13101310
"2045567e-b0af-444a-8c0b-0b6e2dae9e13": {
13111311
"rule_name": "AWS Route 53 Domain Transferred to Another Account",
@@ -1937,6 +1937,12 @@
19371937
"type": "query",
19381938
"version": 107
19391939
},
1940+
"32144184-7bfa-4541-9c3f-b65f16d24df9": {
1941+
"rule_name": "Potential Web Shell ASPX File Creation",
1942+
"sha256": "706d6f81cd64e9b7c43d7e6547570fcd8295082645940422412c06cc142acb03",
1943+
"type": "eql",
1944+
"version": 1
1945+
},
19401946
"3216949c-9300-4c53-b57a-221e364c6457": {
19411947
"rule_name": "Unusual High Word Policy Blocks Detected",
19421948
"sha256": "5e62d95bdfadfdce8505ea429f74acce99d2c32d8fc2ca48883884f599022754",
@@ -2485,9 +2491,9 @@
24852491
},
24862492
"403ef0d3-8259-40c9-a5b6-d48354712e49": {
24872493
"rule_name": "Unusual Persistence via Services Registry",
2488-
"sha256": "953108f9385058fa30661eb24193e480e26db93fe546bc034e3e0844a84afe66",
2494+
"sha256": "3b86134e6a85714e4676aa01b2952e1a4936c55d61269d6858ab4364c23badd8",
24892495
"type": "eql",
2490-
"version": 313
2496+
"version": 314
24912497
},
24922498
"40ddbcc8-6561-44d9-afc8-eefdbfe0cccd": {
24932499
"rule_name": "Suspicious Modprobe File Event",
@@ -2851,9 +2857,9 @@
28512857
},
28522858
"4bd1c1af-79d4-4d37-9efa-6e0240640242": {
28532859
"rule_name": "Unusual Process Execution Path - Alternate Data Stream",
2854-
"sha256": "631a873fb859163e59464b6b025f23707878dd21c31102ac27a712cbacec2dfe",
2860+
"sha256": "08f92365c8289d32623711be239952da8e2d840c26fc0c8cd00126ee17684e8f",
28552861
"type": "eql",
2856-
"version": 313
2862+
"version": 314
28572863
},
28582864
"4c3c6c47-e38f-4944-be27-5c80be973bd7": {
28592865
"rule_name": "Unusual SSHD Child Process",
@@ -3037,9 +3043,9 @@
30373043
},
30383044
"52aaab7b-b51c-441a-89ce-4387b3aea886": {
30393045
"rule_name": "Unusual Network Connection via RunDLL32",
3040-
"sha256": "ae3612661681845eb5f46b07712020784c7c2dd342d10442378a84ae63049b17",
3046+
"sha256": "9a11f66a5f52ddf8e32658df86dc2ad920a342a4f635228e92331ddee8942239",
30413047
"type": "eql",
3042-
"version": 211
3048+
"version": 212
30433049
},
30443050
"52afbdc5-db15-485e-bc24-f5707f820c4b": {
30453051
"rule_name": "Unusual Linux Network Activity",
@@ -3323,6 +3329,12 @@
33233329
"type": "eql",
33243330
"version": 12
33253331
},
3332+
"5a876e0d-d39a-49b9-8ad8-19c9b622203b": {
3333+
"rule_name": "Command Line Obfuscation via Whitespace Padding",
3334+
"sha256": "e8e4200bfd160124ebd18fa2e0136a6e6a467bbd77c38003b4679d2c28ac425a",
3335+
"type": "esql",
3336+
"version": 1
3337+
},
33263338
"5ab49127-b1b3-46e6-8a38-9e8512a2a363": {
33273339
"rule_name": "ROT Encoded Python Script Execution",
33283340
"sha256": "2b7ba34e350a043c0b1190aa7a10e4c9ccc9d59bdc70a8557087fa86129f17ad",
@@ -3379,9 +3391,9 @@
33793391
},
33803392
"5bb4a95d-5a08-48eb-80db-4c3a63ec78a8": {
33813393
"rule_name": "Suspicious PrintSpooler Service Executable File Creation",
3382-
"sha256": "84ef186fe1e107f4233f5b31bb8dbb4cc3d9164eda08868b2dcb9c41450e2ac7",
3394+
"sha256": "70177fc265fa2f24acad68cd0ef289816432b3766a1b8a43e6e4742eeb754522",
33833395
"type": "new_terms",
3384-
"version": 317
3396+
"version": 318
33853397
},
33863398
"5bda8597-69a6-4b9e-87a2-69a7c963ea83": {
33873399
"rule_name": "Boot File Copy",
@@ -3709,9 +3721,9 @@
37093721
},
37103722
"64f17c52-6c6e-479e-ba72-236f3df18f3d": {
37113723
"rule_name": "Potential PowerShell Obfuscation via Invalid Escape Sequences",
3712-
"sha256": "2deaae9f306ec436dbcaa80ca7c8eedc5a563285015398e4017c49fdeabfa756",
3724+
"sha256": "fda6cdc3f42b88f38449c8dc374c2474384889313433b94cfc507f47fcf813c9",
37133725
"type": "esql",
3714-
"version": 4
3726+
"version": 5
37153727
},
37163728
"6505e02e-28dd-41cd-b18f-64e649caa4e2": {
37173729
"rule_name": "Manual Memory Dumping via Proc Filesystem",
@@ -3781,9 +3793,9 @@
37813793
},
37823794
"66883649-f908-4a5b-a1e0-54090a1d3a32": {
37833795
"rule_name": "Connection to Commonly Abused Web Services",
3784-
"sha256": "6a43a05f6e5d1f479ce30211a8231a9e75a714f6cbcc39539e36e4ea0d69677b",
3796+
"sha256": "e0bcdab50088ca7a1827ec90afe4ec21cf937ffaf9b9069142b1709b1dae722d",
37853797
"type": "eql",
3786-
"version": 120
3798+
"version": 121
37873799
},
37883800
"66c058f3-99f4-4d18-952b-43348f2577a0": {
37893801
"rule_name": "Linux Process Hooking via GDB",
@@ -4075,9 +4087,9 @@
40754087
},
40764088
"6ea41894-66c3-4df7-ad6b-2c5074eb3df8": {
40774089
"rule_name": "Potential Windows Error Manager Masquerading",
4078-
"sha256": "eec393cdeeee96acead27b0a15500be1195c020ebfdcc3d880d99c8583ce3e8b",
4090+
"sha256": "5c64c10228a0a54dc71ec736d0ceedf77938cee9b5bc4431aaa0997896c72131",
40794091
"type": "eql",
4080-
"version": 213
4092+
"version": 214
40814093
},
40824094
"6ea55c81-e2ba-42f2-a134-bccf857ba922": {
40834095
"rule_name": "Security Software Discovery using WMIC",
@@ -4766,9 +4778,9 @@
47664778
},
47674779
"818e23e6-2094-4f0e-8c01-22d30f3506c6": {
47684780
"rule_name": "PowerShell Script Block Logging Disabled",
4769-
"sha256": "a74e2f1d576685aa6609e515d8f65b5beafaa71340e79e88d1d6c46e50c4ae67",
4781+
"sha256": "c21246a4390e985fe639c73d06b845ffd8a86744834565cfb9a614a61ebc0a22",
47704782
"type": "eql",
4771-
"version": 312
4783+
"version": 313
47724784
},
47734785
"81cc58f5-8062-49a2-ba84-5cc4b4d31c40": {
47744786
"rule_name": "Persistence via Kernel Module Modification",
@@ -4826,9 +4838,9 @@
48264838
},
48274839
"83bf249e-4348-47ba-9741-1202a09556ad": {
48284840
"rule_name": "Suspicious Windows Powershell Arguments",
4829-
"sha256": "6a54429f392cbcfeb523e95780d8d88fba8ee94dec8f94a146586faccec92ba4",
4841+
"sha256": "d735d2babf46df807a11f9b74d63af45871886e7e814b0ebdcc72455f852dd6d",
48304842
"type": "eql",
4831-
"version": 206
4843+
"version": 207
48324844
},
48334845
"83e9c2b3-24ef-4c1d-a8cd-5ebafb5dfa2f": {
48344846
"rule_name": "Attempt to Disable IPTables or Firewall",
@@ -5865,9 +5877,9 @@
58655877
},
58665878
"9f432a8b-9588-4550-838e-1f77285580d3": {
58675879
"rule_name": "Dynamic IEX Reconstruction via Method String Access",
5868-
"sha256": "23f848bcf8ab02b3323f34b311b522159a77a6bf97dcc3d8089023e82dd9f9d1",
5880+
"sha256": "d780db42a9137fadf25fea4f63c471704e7c6f0b488e4dbb61ceb66ce75e0efc",
58695881
"type": "esql",
5870-
"version": 4
5882+
"version": 5
58715883
},
58725884
"9f962927-1a4f-45f3-a57b-287f2c7029c1": {
58735885
"rule_name": "Potential Credential Access via DCSync",
@@ -6455,9 +6467,9 @@
64556467
},
64566468
"b0c98cfb-0745-4513-b6f9-08dddb033490": {
64576469
"rule_name": "Potential Dynamic IEX Reconstruction via Environment Variables",
6458-
"sha256": "29e5db5ddaca083a914bfd531f068d353526cd492987ef80ced248ca1a8a5f29",
6470+
"sha256": "9107236bf5385a208a94f3b3a6934b5e38c8a96c3e94b398a2ca18dfc47a82c6",
64596471
"type": "esql",
6460-
"version": 3
6472+
"version": 4
64616473
},
64626474
"b11116fd-023c-4718-aeb8-fa9d283fc53b": {
64636475
"rule_name": "Kubeconfig File Creation or Modification",
@@ -6989,9 +7001,9 @@
69897001
},
69907002
"c18975f5-676c-4091-b626-81e8938aa2ee": {
69917003
"rule_name": "Potential RemoteMonologue Attack",
6992-
"sha256": "5bfa9994c043217b1bfb42b4f0028e2871267f04b10dc7ba6898bc97a5f6551c",
7004+
"sha256": "f6b213b207b6c6bec26cd71b03f0737f031091f4392cb2de1ada95d48a1ed594",
69937005
"type": "eql",
6994-
"version": 2
7006+
"version": 3
69957007
},
69967008
"c1a9ed70-d349-11ef-841c-f661ea17fbcd": {
69977009
"rule_name": "Unusual AWS S3 Object Encryption with SSE-C",
@@ -7440,9 +7452,9 @@
74407452
},
74417453
"cd89602e-9db0-48e3-9391-ae3bf241acd8": {
74427454
"rule_name": "MFA Deactivation with no Re-Activation for Okta User Account",
7443-
"sha256": "04ca550d18255b6f9e3437537b63cbdeedfe26f51c89cd8415e639ca6e57b68b",
7455+
"sha256": "ea5c43802417daa4603e8ddd5c129a8c63d3a5fc0bdf6ac8a481e2499dba26db",
74447456
"type": "eql",
7445-
"version": 415
7457+
"version": 416
74467458
},
74477459
"cdbebdc1-dc97-43c6-a538-f26a20c0a911": {
74487460
"rule_name": "Okta User Session Impersonation",
@@ -8420,9 +8432,9 @@
84208432
},
84218433
"e903ce9a-5ce6-4246-bb14-75ed3ec2edf5": {
84228434
"rule_name": "Potential PowerShell Obfuscation via String Reordering",
8423-
"sha256": "61334267fab7a40c13164b761aa5542572e84f08266faa14e6282c22353baedb",
8435+
"sha256": "40bf0892c2068fff5e2b61f79cb7b0eedd5aaaa6193bd39a6eb188ef6184aac3",
84248436
"type": "esql",
8425-
"version": 5
8437+
"version": 6
84268438
},
84278439
"e90ee3af-45fc-432e-a850-4a58cf14a457": {
84288440
"rule_name": "High Number of Okta User Password Reset or Unlock Attempts",
@@ -8702,9 +8714,9 @@
87028714
},
87038715
"f036953a-4615-4707-a1ca-dc53bf69dcd5": {
87048716
"rule_name": "Unusual Child Processes of RunDLL32",
8705-
"sha256": "5c086b3ea051770a44d257ef1b96a70801abf1965e2b5b1d1d4e54aaf3e033db",
8717+
"sha256": "b38b45cb340ce26c11c6845525f90bf3f24d61b736af9798d56249d3ab3547bd",
87068718
"type": "eql",
8707-
"version": 211
8719+
"version": 212
87088720
},
87098721
"f0493cb4-9b15-43a9-9359-68c23a7f2cf3": {
87108722
"rule_name": "Suspicious HTML File Creation",
@@ -8852,9 +8864,9 @@
88528864
},
88538865
"f38633f4-3b31-4c80-b13d-e77c70ce8254": {
88548866
"rule_name": "Potential PowerShell Obfuscation via Reverse Keywords",
8855-
"sha256": "1a7bb59668aeb61b005ad82af62c813287c631d756892a3770a2eac56ca9102c",
8867+
"sha256": "4935469fc2fc470b586e4d5f9667f0e749fdc27c59dd87f33de369314ff2c9c4",
88568868
"type": "esql",
8857-
"version": 3
8869+
"version": 4
88588870
},
88598871
"f391d3fd-219b-42a3-9ba9-2f66eb0155aa": {
88608872
"rule_name": "Kill Command Execution",
@@ -9153,9 +9165,9 @@
91539165
},
91549166
"f9753455-8d55-4ad8-b70a-e07b6f18deea": {
91559167
"rule_name": "Potential PowerShell Obfuscation via High Special Character Proportion",
9156-
"sha256": "54c9ab288e075807483eab23fbbea59aba7d8f760406d32755b0f297bbfe0810",
9168+
"sha256": "26098d2afb164e6f05a99cf24bd627301f808c5c1240693437cb14925bfab1c0",
91579169
"type": "esql",
9158-
"version": 2
9170+
"version": 3
91599171
},
91609172
"f9790abf-bd0c-45f9-8b5f-d0b74015e029": {
91619173
"rule_name": "Privileged Account Brute Force",
@@ -9171,9 +9183,9 @@
91719183
},
91729184
"f9abcddc-a05d-4345-a81d-000b79aa5525": {
91739185
"rule_name": "Potential PowerShell Obfuscation via High Numeric Character Proportion",
9174-
"sha256": "014464fccb4a724e2e3fe5fcc79cc09c6d0fa696ee1d2d18d1a4ebe8c97ac533",
9186+
"sha256": "fa648e659bffe932aa1fffefe9c560668d631de9217505b3e3a7df813857b011",
91759187
"type": "esql",
9176-
"version": 4
9188+
"version": 5
91779189
},
91789190
"fa01341d-6662-426b-9d0c-6d81e33c8a9d": {
91799191
"rule_name": "Remote File Copy to a Hidden Share",

detection_rules/rule_formatter.py

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,6 @@ class RuleTomlEncoder(toml.TomlEncoder): # type: ignore[reportMissingTypeArgume
123123
def __init__(self, *args: Any, **kwargs: Any) -> None:
124124
"""Create the encoder but override some default functions."""
125125
super().__init__(*args, **kwargs) # type: ignore[reportUnknownMemberType]
126-
self._old_dump_str = toml.TomlEncoder().dump_funcs[str]
127126
self._old_dump_list = toml.TomlEncoder().dump_funcs[list]
128127
self.dump_funcs[str] = self.dump_str
129128
self.dump_funcs[str] = self.dump_str
@@ -148,10 +147,12 @@ def dump_str(self, v: str | NonformattedField) -> str:
148147
if multiline:
149148
if raw:
150149
return "".join([TRIPLE_DQ, *initial_newline, *lines, TRIPLE_DQ])
151-
return "\n".join([TRIPLE_SQ] + [self._old_dump_str(line)[1:-1] for line in lines] + [TRIPLE_SQ])
150+
return "\n".join([TRIPLE_SQ] + [json.dumps(line)[1:-1] for line in lines] + [TRIPLE_SQ])
152151
if raw:
153152
return f"'{lines[0]:s}'"
154-
return self._old_dump_str(v)
153+
# In the toml library there is a magic replace for \\\\x -> u00 that we wish to avoid until #4979 is resolved
154+
# Also addresses an issue where backslashes in certain strings are not properly escaped in self._old_dump_str(v)
155+
return json.dumps(v)
155156

156157
def _dump_flat_list(self, v: Iterable[Any]) -> str:
157158
"""A slightly tweaked version of original dump_list, removing trailing commas."""

docs-dev/ATT&CK-coverage.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ coverage from the state of rules in the `main` branch.
6363
|[Elastic-detection-rules-tags-amazon-route53](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-amazon-route53.json&leave_site_dialog=false&tabs=false)|
6464
|[Elastic-detection-rules-tags-amazon-s3](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-amazon-s3.json&leave_site_dialog=false&tabs=false)|
6565
|[Elastic-detection-rules-tags-amazon-web-services](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-amazon-web-services.json&leave_site_dialog=false&tabs=false)|
66+
|[Elastic-detection-rules-tags-api](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-api.json&leave_site_dialog=false&tabs=false)|
6667
|[Elastic-detection-rules-tags-asset-visibility](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-asset-visibility.json&leave_site_dialog=false&tabs=false)|
6768
|[Elastic-detection-rules-tags-auditd-manager](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-auditd-manager.json&leave_site_dialog=false&tabs=false)|
6869
|[Elastic-detection-rules-tags-aws-cloudtrail](https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fgist.githubusercontent.com%2Ftradebot-elastic%2F0443cfb5016bed103f1940b2f336e45a%2Fraw%2FElastic-detection-rules-tags-aws-cloudtrail.json&leave_site_dialog=false&tabs=false)|

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.3.23"
3+
version = "1.3.26"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

0 commit comments

Comments
 (0)