Skip to content

Commit 27e583c

Browse files
updating GitHub integration schema; fixed MITRE mappings
1 parent 654a307 commit 27e583c

File tree

4 files changed

+12
-6
lines changed

4 files changed

+12
-6
lines changed
0 Bytes
Binary file not shown.
0 Bytes
Binary file not shown.

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.5.22"
3+
version = "1.5.23"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/integrations/github/initial_access_github_actions_workflow_injection_blocked.toml

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ severity = "medium"
6363
tags = [
6464
"Domain: Cloud",
6565
"Use Case: Threat Detection",
66-
"Tractic: Initial Access",
66+
"Tactic: Initial Access",
6767
"Tactic: Persistence",
6868
"Tactic: Execution",
6969
"Data Source: Github",
@@ -108,14 +108,20 @@ id = "T1059"
108108
name = "Command and Scripting Interpreter"
109109
reference = "https://attack.mitre.org/techniques/T1059/"
110110

111+
[rule.threat.tactic]
112+
id = "TA0002"
113+
name = "Execution"
114+
reference = "https://attack.mitre.org/tactics/TA0002/"
115+
116+
[[rule.threat]]
117+
framework = "MITRE ATT&CK"
111118
[[rule.threat.technique]]
112119
id = "T1546"
113120
name = "Event Triggered Execution"
114121
reference = "https://attack.mitre.org/techniques/T1546/"
115122

116123

117124
[rule.threat.tactic]
118-
id = "TA0002"
119-
name = "Execution"
120-
reference = "https://attack.mitre.org/tactics/TA0002/"
121-
125+
id = "TA0003"
126+
name = "Persistence"
127+
reference = "https://attack.mitre.org/tactics/TA0003/"

0 commit comments

Comments
 (0)