Skip to content

Commit c0bd217

Browse files
Merge branch 'main' into terrancedejesus/issue5435
2 parents 6ada8f2 + 8f8ce76 commit c0bd217

21 files changed

+60
-31
lines changed

.github/stale.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ onlyLabels: []
1212
exemptLabels:
1313
- bug
1414
- backlog
15+
- "Rule: Tuning"
16+
- "Rule: New"
1517

1618
# Set to true to ignore issues in a project (defaults to false)
1719
exemptProjects: false

rules/cross-platform/defense_evasion_whitespace_padding_command_line.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/06/30"
33
integration = ["endpoint", "system", "windows", "auditd_manager", "m365_defender", "crowdstrike", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/06/30"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -90,7 +90,7 @@ FROM logs-* metadata _id, _version, _index
9090
// more than 100 spaces in process.command_line
9191
| eval multi_spaces = LOCATE(process.command_line, space(100))
9292
| where multi_spaces > 0
93-
| keep user.name, host.id, host.name, process.command_line, process.executable, process.parent.executable
93+
| keep user.name, host.id, host.name, process.command_line, process.executable, process.parent.executable, _id, _version, _index
9494
'''
9595

9696

rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/07/02"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/12/02"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -201,7 +201,10 @@ from logs-aws.cloudtrail-* metadata _id, _version, _index
201201
Esql.aws_cloudtrail_request_parameters_target_bucket_name,
202202
Esql.aws_cloudtrail_request_parameters_target_object_key,
203203
Esql.aws_cloudtrail_request_parameters_kms_key_account_id,
204-
Esql.aws_cloudtrail_request_parameters_kms_key_id
204+
Esql.aws_cloudtrail_request_parameters_kms_key_id,
205+
_id,
206+
_version,
207+
_index
205208
'''
206209

207210

rules/integrations/aws/impact_s3_static_site_js_file_uploaded.toml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/15"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/10/28"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -113,7 +113,10 @@ from logs-aws.cloudtrail* metadata _id, _version, _index
113113
user_agent.original,
114114
source.ip,
115115
event.action,
116-
@timestamp
116+
@timestamp,
117+
_id,
118+
_version,
119+
_index
117120
'''
118121

119122

rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/13"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/10/13"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -156,7 +156,10 @@ from logs-aws.cloudtrail-* metadata _id, _version, _index
156156
aws.cloudtrail.user_identity.arn,
157157
aws.cloudtrail.user_identity.type,
158158
aws.cloudtrail.user_identity.access_key_id,
159-
source.geo.*
159+
source.geo.*,
160+
_id,
161+
_version,
162+
_index
160163
'''
161164

162165

rules/integrations/azure/initial_access_entra_id_actor_token_user_impersonation_abuse.toml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/09/18"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/18"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -93,12 +93,14 @@ from logs-azure.auditlogs-* metadata _id, _version, _index
9393
azure.auditlogs.operation_name != "Set directory feature on tenant"
9494
and azure.auditlogs.properties.initiated_by.user.userPrincipalName rlike ".+@[A-Za-z0-9.]+\\.[A-Za-z]{2,}"
9595
| keep
96-
_id,
9796
@timestamp,
9897
azure.*,
9998
client.*,
10099
event.*,
101-
source.*
100+
source.*,
101+
_id,
102+
_version,
103+
_index
102104
'''
103105

104106

rules/integrations/azure/persistence_entra_id_oidc_discovery_url_change.toml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/07/14"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -81,7 +81,10 @@ from logs-azure.auditlogs-* metadata _id, _version, _index
8181
source.geo.region_name,
8282
source.geo.country_name,
8383
Esql.azure_auditlogs_properties_auth_oidc_discovery_url_new,
84-
Esql.azure_auditlogs_properties_auth_oidc_discovery_url_old
84+
Esql.azure_auditlogs_properties_auth_oidc_discovery_url_old,
85+
_id,
86+
_version,
87+
_index
8588
'''
8689

8790

rules/windows/defense_evasion_masquerading_as_svchost.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/11/12"
33
integration = ["endpoint", "windows", "system"]
44
maturity = "production"
5-
updated_date = "2025/12/05"
5+
updated_date = "2025/12/09"
66
min_stack_version = "9.1.0"
77
min_stack_comments = "The esql match operator was introduced in version 9.1.0"
88

@@ -72,10 +72,10 @@ query = '''
7272
FROM logs-endpoint.events.process-*, logs-windows.sysmon_operational-*, logs-system.security-*, logs-windows.*, winlogbeat-* metadata _id, _version, _index
7373
| where event.category == "process" and event.type == "start" and
7474
match(process.name, "svchost.exe", { "fuzziness": 1, "max_expansions": 10 }) and
75-
not process.executable in ("C:\\Windows\\SysWOW64\\svchost.exe", "C:\\Windows\\System32\\svchost.exe") and
76-
not process.executable like """\\Device\\HarddiskVolume*\\Windows\\System32\\svchost.exe""" and
77-
not process.executable like """\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\svchost.exe"""
78-
| keep event.dataset, host.name, host.id, user.id, user.name, process.executable, process.parent.executable, process.command_line
75+
not to_lower(process.executable) in ("c:\\windows\\syswow64\\svchost.exe", "c:\\windows\\system32\\svchost.exe") and
76+
not to_lower(process.executable) like """\\device\\harddiskvolume*\\windows\\system32\\svchost.exe""" and
77+
not to_lower(process.executable) like """\\device\\harddiskvolume*\\windows\\syswow64\\svchost.exe"""
78+
| keep event.dataset, host.name, host.id, user.id, user.name, process.executable, process.parent.executable, process.command_line, _id, _version, _index
7979
'''
8080

8181

rules/windows/defense_evasion_posh_obfuscation_backtick.toml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/15"
33
integration = ["windows"]
44
maturity = "production"
5-
updated_date = "2025/12/01"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -111,6 +111,7 @@ from logs-windows.powershell_operational* metadata _id, _version, _index
111111
powershell.sequence,
112112
powershell.total,
113113
_id,
114+
_version,
114115
_index,
115116
host.name,
116117
agent.id,

rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/16"
33
integration = ["windows"]
44
maturity = "production"
5-
updated_date = "2025/12/01"
5+
updated_date = "2025/12/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -109,6 +109,7 @@ from logs-windows.powershell_operational* metadata _id, _version, _index
109109
powershell.sequence,
110110
powershell.total,
111111
_id,
112+
_version,
112113
_index,
113114
host.name,
114115
agent.id,

0 commit comments

Comments
 (0)