Skip to content

Commit 72ec819

Browse files
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4732)
1 parent 5832aec commit 72ec819

File tree

2 files changed

+61
-25
lines changed

2 files changed

+61
-25
lines changed

detection_rules/etc/version.lock.json

Lines changed: 60 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -515,17 +515,24 @@
515515
"version": 5
516516
},
517517
"0ce6487d-8069-4888-9ddd-61b52490cebc": {
518-
"rule_name": "O365 Exchange Suspicious Mailbox Right Delegation",
519-
"sha256": "433ec6996467e5a490dcc8b75069d1b4143e6ef4040333e80228dddd4fe2efd6",
520-
"type": "query",
521-
"version": 210
518+
"rule_name": "Suspicious Mailbox Permission Delegation in Exchange Online",
519+
"sha256": "4d8d3bed1120c39b3997ade0ceb78776ea8e18469df1abfa37bb139ab87fc155",
520+
"type": "new_terms",
521+
"version": 211
522522
},
523523
"0d160033-fab7-4e72-85a3-3a9d80c8bff7": {
524524
"rule_name": "Multiple Alerts Involving a User",
525525
"sha256": "15e804addadde83664812796f8f9823a5c7ebff99e0beb27678162bd9c31e24b",
526526
"type": "threshold",
527527
"version": 4
528528
},
529+
"0d3d2254-2b4a-11f0-a019-f661ea17fbcc": {
530+
"min_stack_version": "8.17",
531+
"rule_name": "Microsoft Entra ID Session Reuse with Suspicious Graph Access",
532+
"sha256": "5c708e3c3878ddd653cdf55f9cbaf029d5b6de268e2681c65df4ccdfd93c3223",
533+
"type": "esql",
534+
"version": 1
535+
},
529536
"0d69150b-96f8-467c-a86d-a67a3378ce77": {
530537
"rule_name": "Nping Process Activity",
531538
"sha256": "c4bdbe8b150dc0ae69e6b9976ce317d49affb800b6a372b6b57f7aae39e58093",
@@ -1573,10 +1580,20 @@
15731580
"version": 107
15741581
},
15751582
"26f68dba-ce29-497b-8e13-b4fde1db5a2d": {
1576-
"rule_name": "Attempts to Brute Force a Microsoft 365 User Account",
1577-
"sha256": "d25046282b20d2a93b29f3016f1dfa97b68488629031ddb7157c032045f36b59",
1583+
"min_stack_version": "8.17",
1584+
"previous": {
1585+
"8.14": {
1586+
"max_allowable_version": 411,
1587+
"rule_name": "Attempts to Brute Force a Microsoft 365 User Account",
1588+
"sha256": "d25046282b20d2a93b29f3016f1dfa97b68488629031ddb7157c032045f36b59",
1589+
"type": "esql",
1590+
"version": 312
1591+
}
1592+
},
1593+
"rule_name": "Potential Microsoft 365 User Account Brute Force",
1594+
"sha256": "e19432ea193cb159db6a83bccae69b3a2165162645c22b0f8e36bee3f71ddb29",
15781595
"type": "esql",
1579-
"version": 312
1596+
"version": 412
15801597
},
15811598
"27071ea3-e806-4697-8abc-e22c92aa4293": {
15821599
"rule_name": "PowerShell Script with Archive Compression Capabilities",
@@ -1751,9 +1768,9 @@
17511768
},
17521769
"2a3f38a8-204e-11f0-9c1f-f661ea17fbcd": {
17531770
"rule_name": "Microsoft Graph First Occurrence of Client Request",
1754-
"sha256": "6b466d820148d0cfc60bfd789a05cff1216e302972ec381bde5a8b6b44f6350c",
1771+
"sha256": "b4148f8d9943e630d980806e0c498a1c96623a4c53fbd882da857b6004a18c27",
17551772
"type": "new_terms",
1756-
"version": 1
1773+
"version": 2
17571774
},
17581775
"2a692072-d78d-42f3-a48a-775677d79c4e": {
17591776
"rule_name": "Potential Code Execution via Postgresql",
@@ -3298,10 +3315,10 @@
32983315
"version": 206
32993316
},
33003317
"581add16-df76-42bb-af8e-c979bfb39a59": {
3301-
"rule_name": "Deleting Backup Catalogs with Wbadmin",
3302-
"sha256": "c84484db7d213b2da4645d1127526eb0f4d34edc4309fc2f53911783db82cb39",
3318+
"rule_name": "Backup Deletion with Wbadmin",
3319+
"sha256": "bd99f1c1dc1bbc1957f29cd1c182ab5d00d9770fd4dd77a724fee4634f6f8135",
33033320
"type": "eql",
3304-
"version": 317
3321+
"version": 318
33053322
},
33063323
"58aa72ca-d968-4f34-b9f7-bea51d75eb50": {
33073324
"rule_name": "RDP Enabled via Registry",
@@ -4304,9 +4321,9 @@
43044321
},
43054322
"71bccb61-e19b-452f-b104-79a60e546a95": {
43064323
"rule_name": "Unusual File Creation - Alternate Data Stream",
4307-
"sha256": "77153f9c14950adc74a164546568b82a599d966d5573409efd2a3e77224460af",
4324+
"sha256": "2d3be75d18124f279d600e4db3abfe4f05cd68abde7df9dc7bd130a75c5df7d0",
43084325
"type": "eql",
4309-
"version": 318
4326+
"version": 319
43104327
},
43114328
"71c5cb27-eca5-4151-bb47-64bc3f883270": {
43124329
"rule_name": "Suspicious RDP ActiveX Client Loaded",
@@ -5681,9 +5698,9 @@
56815698
},
56825699
"97fc44d3-8dae-4019-ae83-298c3015600f": {
56835700
"rule_name": "Startup or Run Key Registry Modification",
5684-
"sha256": "4ef6084162b7b7ca5747a6e4208e6088166275efe18e3b1ab8f474071b61ac66",
5701+
"sha256": "39c28c83008ef62eb99a0de82b8be41f060c25120f83de8cd7666d847a57279d",
56855702
"type": "eql",
5686-
"version": 116
5703+
"version": 117
56875704
},
56885705
"980b70a0-c820-11ed-8799-f661ea17fbcc": {
56895706
"rule_name": "Google Workspace Drive Encryption Key(s) Accessed from Anonymous User",
@@ -5962,10 +5979,10 @@
59625979
"version": 315
59635980
},
59645981
"a02cb68e-7c93-48d1-93b2-2c39023308eb": {
5965-
"rule_name": "A scheduled task was updated",
5966-
"sha256": "1948ec1ad7f97c2d6eeef3638dbbaba87d1cb382495b4bb45f1c670deb735f5c",
5967-
"type": "eql",
5968-
"version": 113
5982+
"rule_name": "Unusual Scheduled Task Update",
5983+
"sha256": "a8d0255953541006b7b693b73e9b6eb8888f017f0c86096c34bc51dbf1595d31",
5984+
"type": "new_terms",
5985+
"version": 114
59695986
},
59705987
"a0ddb77b-0318-41f0-91e4-8c1b5528834f": {
59715988
"rule_name": "Potential Privilege Escalation via Python cap_setuid",
@@ -6066,9 +6083,9 @@
60666083
},
60676084
"a3cc60d8-2701-11f0-accf-f661ea17fbcd": {
60686085
"rule_name": "Microsoft Entra ID SharePoint Access for User Principal via Auth Broker",
6069-
"sha256": "411113088ba431184790b1d524a1f56f33cb24eee23e03dedb7ce9738bc5accf",
6086+
"sha256": "5b4cb946748f0ce168135326a6b785b8d6237caab940d43e42792bc51db177e7",
60706087
"type": "new_terms",
6071-
"version": 1
6088+
"version": 2
60726089
},
60736090
"a3ea12f3-0d4e-4667-8b44-4230c63f3c75": {
60746091
"rule_name": "Execution via local SxS Shared Module",
@@ -7977,6 +7994,12 @@
79777994
"type": "eql",
79787995
"version": 205
79797996
},
7997+
"da0d4bae-33ee-11f0-a59f-f661ea17fbcd": {
7998+
"rule_name": "Microsoft Entra ID Protection - Risk Detections",
7999+
"sha256": "9b9497a3de9a58ad095e62964a8a2805cd52f9730e7907d236978486f7068bd6",
8000+
"type": "query",
8001+
"version": 1
8002+
},
79808003
"da7733b1-fe08-487e-b536-0a04c6d8b0cd": {
79818004
"rule_name": "Code Signing Policy Modification Through Registry",
79828005
"sha256": "4465a0b284dd1be9c6a5f56ece22af068c8a61e9af4e7a72e9fc3f614980fd77",
@@ -8122,6 +8145,13 @@
81228145
"type": "new_terms",
81238146
"version": 3
81248147
},
8148+
"de67f85e-2d43-11f0-b8c9-f661ea17fbcc": {
8149+
"min_stack_version": "8.17",
8150+
"rule_name": "Multiple Microsoft 365 User Account Lockouts in Short Time Window",
8151+
"sha256": "75096b67404510e3b605f336c782c92b5393e605841cbe4a5c2c272e8c34adc1",
8152+
"type": "esql",
8153+
"version": 1
8154+
},
81258155
"de9bd7e0-49e9-4e92-a64d-53ade2e66af1": {
81268156
"rule_name": "Unusual Child Process from a System Virtual Process",
81278157
"sha256": "84d467b82d0972b0fd22be0fc6fa605093b59f4f5daddf51446d9c5ed62aac35",
@@ -8540,6 +8570,12 @@
85408570
"type": "eql",
85418571
"version": 312
85428572
},
8573+
"e882e934-2aaa-11f0-8272-f661ea17fbcc": {
8574+
"rule_name": "Suspicious Email Access by First-Party Application via Microsoft Graph",
8575+
"sha256": "86ff54b665e83cd9f3393f348b5867905d4f8c0479c8d2ba5c6a3f21800bbc3d",
8576+
"type": "new_terms",
8577+
"version": 1
8578+
},
85438579
"e88d1fe9-b2f4-48d4-bace-a026dc745d4b": {
85448580
"rule_name": "Host Files System Changes via Windows Subsystem for Linux",
85458581
"sha256": "1e96b9c195bd7e985d54a7ebce9b7d3769f220cf8075ff16bc5572bae23b6fa7",
@@ -8908,9 +8944,9 @@
89088944
"f0cc239b-67fa-46fc-89d4-f861753a40f5": {
89098945
"min_stack_version": "8.17",
89108946
"rule_name": "Microsoft Azure or Mail Sign-in from a Suspicious Source",
8911-
"sha256": "3596cbeaa0407a5f2e35ddd85a3ee3d81a599369c2fe3cd3fe28a8251fee3da8",
8947+
"sha256": "4fd69243a3f405a2fc8dac28257d472860062369ad573cd79c1e6fc5b6add7a7",
89128948
"type": "esql",
8913-
"version": 1
8949+
"version": 2
89148950
},
89158951
"f0eb70e9-71e9-40cd-813f-bf8e8c812cb1": {
89168952
"rule_name": "Execution with Explicit Credentials via Scripting",

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.2.8"
3+
version = "1.2.9"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

0 commit comments

Comments
 (0)