nldcsc-elastic-rules 0.0.8__py3-none-any.whl → 0.0.16__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (123) hide show
  1. nldcsc_elastic_rules/__init__.py +1 -1
  2. nldcsc_elastic_rules/rules/{linux → cross-platform}/command_and_control_curl_wget_spawn_via_nodejs_parent.toml +32 -11
  3. nldcsc_elastic_rules/rules/cross-platform/command_and_control_genai_process_suspicious_tld_connection.toml +134 -0
  4. nldcsc_elastic_rules/rules/cross-platform/command_and_control_genai_process_unusual_domain.toml +128 -0
  5. nldcsc_elastic_rules/rules/cross-platform/credential_access_genai_process_sensitive_file_access.toml +154 -0
  6. nldcsc_elastic_rules/rules/cross-platform/credential_access_gitleaks_execution.toml +114 -0
  7. nldcsc_elastic_rules/rules/cross-platform/credential_access_multi_could_secrets_via_api.toml +198 -0
  8. nldcsc_elastic_rules/rules/cross-platform/credential_access_trufflehog_execution.toml +24 -5
  9. nldcsc_elastic_rules/rules/cross-platform/defense_evasion_genai_config_modification.toml +120 -0
  10. nldcsc_elastic_rules/rules/cross-platform/defense_evasion_genai_process_compiling_executables.toml +158 -0
  11. nldcsc_elastic_rules/rules/cross-platform/defense_evasion_genai_process_encoding_prior_to_network_activity.toml +172 -0
  12. nldcsc_elastic_rules/rules/cross-platform/defense_evasion_potential_http_downgrade_attack.toml +98 -0
  13. nldcsc_elastic_rules/rules/cross-platform/discovery_web_server_local_file_inclusion_activity.toml +172 -0
  14. nldcsc_elastic_rules/rules/cross-platform/discovery_web_server_remote_file_inclusion_activity.toml +133 -0
  15. nldcsc_elastic_rules/rules/cross-platform/execution_aws_ec2_lolbin_via_ssm.toml +250 -0
  16. nldcsc_elastic_rules/rules/{linux/persistence_nodejs_pre_or_post_install_script_execution.toml → cross-platform/execution_nodejs_pre_or_post_install_script_execution.toml} +40 -24
  17. nldcsc_elastic_rules/rules/cross-platform/execution_privileged_container_creation_with_host_reference.toml +146 -0
  18. nldcsc_elastic_rules/rules/cross-platform/execution_register_github_actions_runner.toml +126 -0
  19. nldcsc_elastic_rules/rules/cross-platform/execution_via_github_actions_runner.toml +130 -0
  20. nldcsc_elastic_rules/rules/cross-platform/execution_via_github_runner_with_runner_tracking_id_tampering_via_env_vars.toml +163 -0
  21. nldcsc_elastic_rules/rules/cross-platform/initial_access_execution_susp_react_serv_child.toml +130 -0
  22. nldcsc_elastic_rules/rules/cross-platform/initial_access_file_upload_followed_by_get_request.toml +145 -0
  23. nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml +4 -1
  24. nldcsc_elastic_rules/rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml +3 -4
  25. nldcsc_elastic_rules/rules/cross-platform/persistence_web_server_potential_command_injection.toml +23 -25
  26. nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_discovery_or_fuzzing_activity.toml +13 -14
  27. nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml +8 -5
  28. nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_response_codes.toml +12 -12
  29. nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml +37 -43
  30. nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_rds_instance_restored.toml +137 -45
  31. nldcsc_elastic_rules/rules/integrations/aws/discovery_iam_principal_enumeration_via_update_assume_role_policy.toml +152 -0
  32. nldcsc_elastic_rules/rules/integrations/aws/discovery_multiple_discovery_api_calls_via_cli.toml +242 -0
  33. nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_export.toml +141 -33
  34. nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_shared_with_another_account.toml +108 -30
  35. nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_external_account_access.toml +2 -1
  36. nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_replicated_to_external_account.toml +114 -27
  37. nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_deleted.toml +174 -0
  38. nldcsc_elastic_rules/rules/integrations/aws/impact_kms_cmk_disabled_or_scheduled_for_deletion.toml +111 -33
  39. nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion.toml +129 -43
  40. nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion_protection_disabled.toml +89 -27
  41. nldcsc_elastic_rules/rules/integrations/aws/impact_rds_snapshot_deleted.toml +127 -37
  42. nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml +160 -43
  43. nldcsc_elastic_rules/rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml +20 -10
  44. nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_error_message_spike.toml +35 -1
  45. nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_error_code.toml +59 -1
  46. nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml +19 -1
  47. nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml +19 -1
  48. nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_user.toml +58 -1
  49. nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_db_instance_password_modified.toml +109 -35
  50. nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_made_public.toml +103 -22
  51. nldcsc_elastic_rules/rules/integrations/aws/persistence_redshift_instance_creation.toml +3 -3
  52. nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_assume_root_from_rare_user_and_member_account.toml +126 -69
  53. nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_susp_device_code_signin.toml +134 -0
  54. nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml +2 -2
  55. nldcsc_elastic_rules/rules/integrations/azure/ml_azure_event_failures.toml +124 -0
  56. nldcsc_elastic_rules/rules/integrations/azure/ml_azure_rare_event_failures.toml +148 -0
  57. nldcsc_elastic_rules/rules/integrations/azure/ml_azure_rare_method_by_city.toml +109 -0
  58. nldcsc_elastic_rules/rules/integrations/azure/ml_azure_rare_method_by_country.toml +108 -0
  59. nldcsc_elastic_rules/rules/integrations/azure/ml_azure_rare_method_by_user.toml +147 -0
  60. nldcsc_elastic_rules/rules/integrations/fim/persistence_suspicious_file_modifications.toml +9 -1
  61. nldcsc_elastic_rules/rules/integrations/gcp/ml_gcp_error_message_spike.toml +95 -0
  62. nldcsc_elastic_rules/rules/integrations/gcp/ml_gcp_rare_error_code.toml +118 -0
  63. nldcsc_elastic_rules/rules/integrations/gcp/ml_gcp_rare_method_by_city.toml +79 -0
  64. nldcsc_elastic_rules/rules/integrations/gcp/ml_gcp_rare_method_by_country.toml +79 -0
  65. nldcsc_elastic_rules/rules/integrations/gcp/ml_gcp_rare_method_by_user.toml +117 -0
  66. nldcsc_elastic_rules/rules/integrations/github/initial_access_github_register_self_hosted_runner.toml +92 -0
  67. nldcsc_elastic_rules/rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml +24 -14
  68. nldcsc_elastic_rules/rules/linux/defense_evasion_file_deletion_via_shred.toml +12 -5
  69. nldcsc_elastic_rules/rules/linux/execution_suspicious_pod_or_container_creation_command_execution.toml +150 -0
  70. nldcsc_elastic_rules/rules/linux/persistence_at_job_creation.toml +4 -4
  71. nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation.toml +12 -7
  72. nldcsc_elastic_rules/rules/linux/persistence_pth_file_creation.toml +6 -1
  73. nldcsc_elastic_rules/rules/linux/persistence_site_and_user_customize_file_creation.toml +6 -1
  74. nldcsc_elastic_rules/rules/linux/persistence_web_server_unusual_command_execution.toml +155 -0
  75. nldcsc_elastic_rules/rules/ml/ml_high_count_events_for_a_host_name.toml +58 -1
  76. nldcsc_elastic_rules/rules/ml/ml_high_count_network_denies.toml +71 -1
  77. nldcsc_elastic_rules/rules/ml/ml_high_count_network_events.toml +53 -1
  78. nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_activity.toml +56 -1
  79. nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_port_activity.toml +40 -1
  80. nldcsc_elastic_rules/rules/ml/ml_low_count_events_for_a_host_name.toml +27 -1
  81. nldcsc_elastic_rules/rules/ml/ml_packetbeat_rare_server_domain.toml +63 -1
  82. nldcsc_elastic_rules/rules/ml/ml_rare_destination_country.toml +68 -1
  83. nldcsc_elastic_rules/rules/ml/ml_spike_in_traffic_to_a_country.toml +53 -1
  84. nldcsc_elastic_rules/rules/ml/ml_windows_anomalous_network_activity.toml +56 -1
  85. nldcsc_elastic_rules/rules/network/initial_access_react_server_components_rce_attempt.toml +123 -0
  86. nldcsc_elastic_rules/rules/promotions/external_alerts.toml +2 -2
  87. nldcsc_elastic_rules/rules/windows/command_and_control_common_webservices.toml +4 -3
  88. nldcsc_elastic_rules/rules/windows/credential_access_rare_webdav_destination.toml +3 -4
  89. nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_svchost.toml +11 -8
  90. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation.toml +25 -2
  91. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick.toml +2 -3
  92. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml +2 -3
  93. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_char_arrays.toml +2 -3
  94. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_concat_dynamic.toml +2 -3
  95. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_high_number_proportion.toml +2 -3
  96. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_env_vars_reconstruction.toml +2 -3
  97. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_string_reconstruction.toml +2 -3
  98. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_index_reversal.toml +2 -3
  99. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_reverse_keyword.toml +2 -3
  100. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_concat.toml +2 -3
  101. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_format.toml +2 -3
  102. nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_whitespace_special_proportion.toml +2 -3
  103. nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_filesystem.toml +13 -10
  104. nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_functions.toml +3 -2
  105. nldcsc_elastic_rules/rules/windows/execution_suspicious_powershell_imgload.toml +7 -2
  106. nldcsc_elastic_rules/rules/windows/execution_windows_powershell_susp_args.toml +9 -2
  107. nldcsc_elastic_rules/rules/windows/impact_mod_critical_os_files.toml +16 -6
  108. nldcsc_elastic_rules/rules/windows/lateral_movement_credential_access_kerberos_correlation.toml +7 -2
  109. nldcsc_elastic_rules/rules/windows/lateral_movement_scheduled_task_target.toml +2 -2
  110. nldcsc_elastic_rules/rules/windows/persistence_browser_extension_install.toml +19 -2
  111. nldcsc_elastic_rules/rules/windows/persistence_msi_installer_task_startup.toml +50 -13
  112. nldcsc_elastic_rules/rules/windows/persistence_via_application_shimming.toml +12 -2
  113. nldcsc_elastic_rules/rules/windows/privilege_escalation_tokenmanip_sedebugpriv_enabled.toml +24 -18
  114. nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml +14 -2
  115. nldcsc_elastic_rules/rules/windows/privilege_escalation_via_ppid_spoofing.toml +3 -2
  116. {nldcsc_elastic_rules-0.0.8.dist-info → nldcsc_elastic_rules-0.0.16.dist-info}/METADATA +1 -1
  117. {nldcsc_elastic_rules-0.0.8.dist-info → nldcsc_elastic_rules-0.0.16.dist-info}/RECORD +119 -87
  118. nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml +0 -105
  119. nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml +0 -135
  120. nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml +0 -155
  121. nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml +0 -95
  122. {nldcsc_elastic_rules-0.0.8.dist-info → nldcsc_elastic_rules-0.0.16.dist-info}/WHEEL +0 -0
  123. {nldcsc_elastic_rules-0.0.8.dist-info → nldcsc_elastic_rules-0.0.16.dist-info}/top_level.txt +0 -0
@@ -2,7 +2,7 @@
2
2
  creation_date = "2021/04/05"
3
3
  integration = ["endpoint", "network_traffic"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/15"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 75
@@ -110,3 +110,55 @@ Machine learning models analyze network traffic patterns to identify anomalies,
110
110
  - Review and update network access controls and permissions to ensure only authorized users and devices have access to sensitive data and systems.
111
111
  - Implement enhanced monitoring and alerting for similar traffic patterns to improve early detection and response to future incidents."""
112
112
 
113
+ [[rule.threat]]
114
+ framework = "MITRE ATT&CK"
115
+
116
+ [rule.threat.tactic]
117
+ id = "TA0010"
118
+ name = "Exfiltration"
119
+ reference = "https://attack.mitre.org/tactics/TA0010/"
120
+
121
+ [[rule.threat.technique]]
122
+ id = "T1041"
123
+ name = "Exfiltration Over C2 Channel"
124
+ reference = "https://attack.mitre.org/techniques/T1041/"
125
+
126
+ [[rule.threat]]
127
+ framework = "MITRE ATT&CK"
128
+
129
+ [rule.threat.tactic]
130
+ id = "TA0007"
131
+ name = "Discovery"
132
+ reference = "https://attack.mitre.org/tactics/TA0007/"
133
+
134
+ [[rule.threat.technique]]
135
+ id = "T1046"
136
+ name = "Network Service Discovery"
137
+ reference = "https://attack.mitre.org/techniques/T1046/"
138
+
139
+ [[rule.threat]]
140
+ framework = "MITRE ATT&CK"
141
+
142
+ [rule.threat.tactic]
143
+ id = "TA0043"
144
+ name = "Reconnaissance"
145
+ reference = "https://attack.mitre.org/tactics/TA0043/"
146
+
147
+ [[rule.threat.technique]]
148
+ id = "T1595"
149
+ name = "Active Scanning"
150
+ reference = "https://attack.mitre.org/techniques/T1595/"
151
+
152
+ [[rule.threat]]
153
+ framework = "MITRE ATT&CK"
154
+
155
+ [rule.threat.tactic]
156
+ id = "TA0040"
157
+ name = "Impact"
158
+ reference = "https://attack.mitre.org/tactics/TA0040/"
159
+
160
+ [[rule.threat.technique]]
161
+ id = "T1498"
162
+ name = "Network Denial of Service"
163
+ reference = "https://attack.mitre.org/techniques/T1498/"
164
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/03/25"
3
3
  integration = ["auditd_manager", "endpoint"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/17"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 50
@@ -92,3 +92,58 @@ tags = [
92
92
  ]
93
93
  type = "machine_learning"
94
94
 
95
+ [[rule.threat]]
96
+ framework = "MITRE ATT&CK"
97
+
98
+ [rule.threat.tactic]
99
+ id = "TA0011"
100
+ name = "Command and Control"
101
+ reference = "https://attack.mitre.org/tactics/TA0011/"
102
+
103
+ [[rule.threat.technique]]
104
+ id = "T1071"
105
+ name = "Application Layer Protocol"
106
+ reference = "https://attack.mitre.org/techniques/T1071/"
107
+
108
+ [[rule.threat]]
109
+ framework = "MITRE ATT&CK"
110
+
111
+ [rule.threat.tactic]
112
+ id = "TA0008"
113
+ name = "Lateral Movement"
114
+ reference = "https://attack.mitre.org/tactics/TA0008/"
115
+
116
+ [[rule.threat]]
117
+ framework = "MITRE ATT&CK"
118
+
119
+ [rule.threat.tactic]
120
+ id = "TA0003"
121
+ name = "Persistence"
122
+ reference = "https://attack.mitre.org/tactics/TA0003/"
123
+
124
+ [[rule.threat]]
125
+ framework = "MITRE ATT&CK"
126
+
127
+ [rule.threat.tactic]
128
+ id = "TA0005"
129
+ name = "Defense Evasion"
130
+ reference = "https://attack.mitre.org/tactics/TA0005/"
131
+
132
+ [[rule.threat.technique]]
133
+ id = "T1055"
134
+ name = "Process Injection"
135
+ reference = "https://attack.mitre.org/techniques/T1055/"
136
+
137
+ [[rule.threat]]
138
+ framework = "MITRE ATT&CK"
139
+
140
+ [rule.threat.tactic]
141
+ id = "TA0010"
142
+ name = "Exfiltration"
143
+ reference = "https://attack.mitre.org/tactics/TA0010/"
144
+
145
+ [[rule.threat.technique]]
146
+ id = "T1041"
147
+ name = "Exfiltration Over C2 Channel"
148
+ reference = "https://attack.mitre.org/techniques/T1041/"
149
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/03/25"
3
3
  integration = ["auditd_manager", "endpoint"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/15"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 50
@@ -118,3 +118,42 @@ In Linux environments, network ports facilitate communication between applicatio
118
118
  - Implement network segmentation to limit the exposure of critical systems to potential threats and reduce the risk of lateral movement.
119
119
  - Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected."""
120
120
 
121
+ [[rule.threat]]
122
+ framework = "MITRE ATT&CK"
123
+
124
+ [rule.threat.tactic]
125
+ id = "TA0011"
126
+ name = "Command and Control"
127
+ reference = "https://attack.mitre.org/tactics/TA0011/"
128
+
129
+ [[rule.threat.technique]]
130
+ id = "T1071"
131
+ name = "Application Layer Protocol"
132
+ reference = "https://attack.mitre.org/techniques/T1071/"
133
+
134
+ [[rule.threat.technique]]
135
+ id = "T1571"
136
+ name = "Non-Standard Port"
137
+ reference = "https://attack.mitre.org/techniques/T1571/"
138
+
139
+ [[rule.threat]]
140
+ framework = "MITRE ATT&CK"
141
+
142
+ [rule.threat.tactic]
143
+ id = "TA0003"
144
+ name = "Persistence"
145
+ reference = "https://attack.mitre.org/tactics/TA0003/"
146
+
147
+ [[rule.threat]]
148
+ framework = "MITRE ATT&CK"
149
+
150
+ [rule.threat.tactic]
151
+ id = "TA0010"
152
+ name = "Exfiltration"
153
+ reference = "https://attack.mitre.org/tactics/TA0010/"
154
+
155
+ [[rule.threat.technique]]
156
+ id = "T1041"
157
+ name = "Exfiltration Over C2 Channel"
158
+ reference = "https://attack.mitre.org/techniques/T1041/"
159
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2025/02/18"
3
3
  integration = ["endpoint"]
4
4
  maturity = "production"
5
- updated_date = "2025/02/18"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 75
@@ -91,3 +91,29 @@ Host-based traffic monitoring is crucial for identifying anomalies in network ac
91
91
  - Restore any affected services from known good backups if service failure is confirmed as the cause.
92
92
  - Monitor network traffic for any signs of unusual activity or attempts to exploit the situation further.
93
93
  - Escalate the incident to the security operations team for a deeper forensic analysis and to determine if additional hosts are affected."""
94
+
95
+ [[rule.threat]]
96
+ framework = "MITRE ATT&CK"
97
+
98
+ [rule.threat.tactic]
99
+ id = "TA0005"
100
+ name = "Defense Evasion"
101
+ reference = "https://attack.mitre.org/tactics/TA0005/"
102
+
103
+ [[rule.threat.technique]]
104
+ id = "T1562"
105
+ name = "Impair Defenses"
106
+ reference = "https://attack.mitre.org/techniques/T1562/"
107
+
108
+ [[rule.threat]]
109
+ framework = "MITRE ATT&CK"
110
+
111
+ [rule.threat.tactic]
112
+ id = "TA0040"
113
+ name = "Impact"
114
+ reference = "https://attack.mitre.org/tactics/TA0040/"
115
+
116
+ [[rule.threat.technique]]
117
+ id = "T1499"
118
+ name = "Endpoint Denial of Service"
119
+ reference = "https://attack.mitre.org/techniques/T1499/"
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/03/25"
3
3
  integration = ["auditd_manager", "endpoint"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/15"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 50
@@ -118,3 +118,65 @@ Machine learning models analyze network traffic to identify atypical domain name
118
118
  - Implement network-level blocking of the identified unusual domain across the organization to prevent future access attempts.
119
119
  - Update threat intelligence feeds and detection systems with indicators of compromise (IOCs) related to the unusual domain to enhance future detection capabilities."""
120
120
 
121
+ [[rule.threat]]
122
+ framework = "MITRE ATT&CK"
123
+
124
+ [rule.threat.tactic]
125
+ id = "TA0001"
126
+ name = "Initial Access"
127
+ reference = "https://attack.mitre.org/tactics/TA0001/"
128
+
129
+ [[rule.threat.technique]]
130
+ id = "T1566"
131
+ name = "Phishing"
132
+ reference = "https://attack.mitre.org/techniques/T1566/"
133
+
134
+ [[rule.threat.technique.subtechnique]]
135
+ id = "T1566.001"
136
+ name = "Spearphishing Attachment"
137
+ reference = "https://attack.mitre.org/techniques/T1566/001/"
138
+
139
+ [[rule.threat.technique.subtechnique]]
140
+ id = "T1566.002"
141
+ name = "Spearphishing Link"
142
+ reference = "https://attack.mitre.org/techniques/T1566/002/"
143
+
144
+ [[rule.threat]]
145
+ framework = "MITRE ATT&CK"
146
+
147
+ [rule.threat.tactic]
148
+ id = "TA0003"
149
+ name = "Persistence"
150
+ reference = "https://attack.mitre.org/tactics/TA0003/"
151
+
152
+ [[rule.threat]]
153
+ framework = "MITRE ATT&CK"
154
+
155
+ [rule.threat.tactic]
156
+ id = "TA0011"
157
+ name = "Command and Control"
158
+ reference = "https://attack.mitre.org/tactics/TA0011/"
159
+
160
+ [[rule.threat.technique]]
161
+ id = "T1071"
162
+ name = "Application Layer Protocol"
163
+ reference = "https://attack.mitre.org/techniques/T1071/"
164
+
165
+ [[rule.threat.technique.subtechnique]]
166
+ id = "T1071.001"
167
+ name = "Web Protocols"
168
+ reference = "https://attack.mitre.org/techniques/T1071/001/"
169
+
170
+ [[rule.threat]]
171
+ framework = "MITRE ATT&CK"
172
+
173
+ [rule.threat.tactic]
174
+ id = "TA0010"
175
+ name = "Exfiltration"
176
+ reference = "https://attack.mitre.org/tactics/TA0010/"
177
+
178
+ [[rule.threat.technique]]
179
+ id = "T1041"
180
+ name = "Exfiltration Over C2 Channel"
181
+ reference = "https://attack.mitre.org/techniques/T1041/"
182
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2021/04/05"
3
3
  integration = ["endpoint", "network_traffic"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/15"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 75
@@ -115,3 +115,70 @@ Machine learning models analyze network logs to identify traffic to uncommon des
115
115
  - Restore the affected system from a clean backup if necessary, ensuring that all security patches and updates are applied.
116
116
  - Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected."""
117
117
 
118
+ [[rule.threat]]
119
+ framework = "MITRE ATT&CK"
120
+
121
+ [rule.threat.tactic]
122
+ id = "TA0001"
123
+ name = "Initial Access"
124
+ reference = "https://attack.mitre.org/tactics/TA0001/"
125
+
126
+ [[rule.threat.technique]]
127
+ id = "T1566"
128
+ name = "Phishing"
129
+ reference = "https://attack.mitre.org/techniques/T1566/"
130
+
131
+ [[rule.threat.technique.subtechnique]]
132
+ id = "T1566.001"
133
+ name = "Spearphishing Attachment"
134
+ reference = "https://attack.mitre.org/techniques/T1566/001/"
135
+
136
+ [[rule.threat.technique.subtechnique]]
137
+ id = "T1566.002"
138
+ name = "Spearphishing Link"
139
+ reference = "https://attack.mitre.org/techniques/T1566/002/"
140
+
141
+ [[rule.threat]]
142
+ framework = "MITRE ATT&CK"
143
+
144
+ [rule.threat.tactic]
145
+ id = "TA0003"
146
+ name = "Persistence"
147
+ reference = "https://attack.mitre.org/tactics/TA0003/"
148
+
149
+ [[rule.threat]]
150
+ framework = "MITRE ATT&CK"
151
+
152
+ [rule.threat.tactic]
153
+ id = "TA0011"
154
+ name = "Command and Control"
155
+ reference = "https://attack.mitre.org/tactics/TA0011/"
156
+
157
+ [[rule.threat.technique]]
158
+ id = "T1071"
159
+ name = "Application Layer Protocol"
160
+ reference = "https://attack.mitre.org/techniques/T1071/"
161
+
162
+ [[rule.threat.technique]]
163
+ id = "T1105"
164
+ name = "Ingress Tool Transfer"
165
+ reference = "https://attack.mitre.org/techniques/T1105/"
166
+
167
+ [[rule.threat]]
168
+ framework = "MITRE ATT&CK"
169
+
170
+ [rule.threat.tactic]
171
+ id = "TA0010"
172
+ name = "Exfiltration"
173
+ reference = "https://attack.mitre.org/tactics/TA0010/"
174
+
175
+ [[rule.threat.technique]]
176
+ id = "T1041"
177
+ name = "Exfiltration Over C2 Channel"
178
+ reference = "https://attack.mitre.org/techniques/T1041/"
179
+
180
+ [[rule.threat.technique]]
181
+ id = "T1048"
182
+ name = "Exfiltration Over Alternative Protocol"
183
+ reference = "https://attack.mitre.org/techniques/T1048/"
184
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2021/04/05"
3
3
  integration = ["endpoint", "network_traffic"]
4
4
  maturity = "production"
5
- updated_date = "2025/01/15"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 75
@@ -115,3 +115,55 @@ severity = "low"
115
115
  tags = ["Use Case: Threat Detection", "Rule Type: ML", "Rule Type: Machine Learning", "Resources: Investigation Guide"]
116
116
  type = "machine_learning"
117
117
 
118
+ [[rule.threat]]
119
+ framework = "MITRE ATT&CK"
120
+
121
+ [rule.threat.tactic]
122
+ id = "TA0010"
123
+ name = "Exfiltration"
124
+ reference = "https://attack.mitre.org/tactics/TA0010/"
125
+
126
+ [[rule.threat.technique]]
127
+ id = "T1041"
128
+ name = "Exfiltration Over C2 Channel"
129
+ reference = "https://attack.mitre.org/techniques/T1041/"
130
+
131
+ [[rule.threat]]
132
+ framework = "MITRE ATT&CK"
133
+
134
+ [rule.threat.tactic]
135
+ id = "TA0011"
136
+ name = "Command and Control"
137
+ reference = "https://attack.mitre.org/tactics/TA0011/"
138
+
139
+ [[rule.threat.technique]]
140
+ id = "T1071"
141
+ name = "Application Layer Protocol"
142
+ reference = "https://attack.mitre.org/techniques/T1071/"
143
+
144
+ [[rule.threat]]
145
+ framework = "MITRE ATT&CK"
146
+
147
+ [rule.threat.tactic]
148
+ id = "TA0007"
149
+ name = "Discovery"
150
+ reference = "https://attack.mitre.org/tactics/TA0007/"
151
+
152
+ [[rule.threat.technique]]
153
+ id = "T1046"
154
+ name = "Network Service Discovery"
155
+ reference = "https://attack.mitre.org/techniques/T1046/"
156
+
157
+ [[rule.threat]]
158
+ framework = "MITRE ATT&CK"
159
+
160
+ [rule.threat.tactic]
161
+ id = "TA0043"
162
+ name = "Reconnaissance"
163
+ reference = "https://attack.mitre.org/tactics/TA0043/"
164
+
165
+ [[rule.threat.technique]]
166
+ id = "T1595"
167
+ name = "Active Scanning"
168
+ reference = "https://attack.mitre.org/techniques/T1595/"
169
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/03/25"
3
3
  integration = ["endpoint", "windows"]
4
4
  maturity = "production"
5
- updated_date = "2025/03/20"
5
+ updated_date = "2025/11/18"
6
6
 
7
7
  [rule]
8
8
  anomaly_threshold = 50
@@ -89,3 +89,58 @@ tags = [
89
89
  ]
90
90
  type = "machine_learning"
91
91
 
92
+ [[rule.threat]]
93
+ framework = "MITRE ATT&CK"
94
+
95
+ [rule.threat.tactic]
96
+ id = "TA0011"
97
+ name = "Command and Control"
98
+ reference = "https://attack.mitre.org/tactics/TA0011/"
99
+
100
+ [[rule.threat.technique]]
101
+ id = "T1071"
102
+ name = "Application Layer Protocol"
103
+ reference = "https://attack.mitre.org/techniques/T1071/"
104
+
105
+ [[rule.threat]]
106
+ framework = "MITRE ATT&CK"
107
+
108
+ [rule.threat.tactic]
109
+ id = "TA0008"
110
+ name = "Lateral Movement"
111
+ reference = "https://attack.mitre.org/tactics/TA0008/"
112
+
113
+ [[rule.threat]]
114
+ framework = "MITRE ATT&CK"
115
+
116
+ [rule.threat.tactic]
117
+ id = "TA0003"
118
+ name = "Persistence"
119
+ reference = "https://attack.mitre.org/tactics/TA0003/"
120
+
121
+ [[rule.threat]]
122
+ framework = "MITRE ATT&CK"
123
+
124
+ [rule.threat.tactic]
125
+ id = "TA0005"
126
+ name = "Defense Evasion"
127
+ reference = "https://attack.mitre.org/tactics/TA0005/"
128
+
129
+ [[rule.threat.technique]]
130
+ id = "T1055"
131
+ name = "Process Injection"
132
+ reference = "https://attack.mitre.org/techniques/T1055/"
133
+
134
+ [[rule.threat]]
135
+ framework = "MITRE ATT&CK"
136
+
137
+ [rule.threat.tactic]
138
+ id = "TA0010"
139
+ name = "Exfiltration"
140
+ reference = "https://attack.mitre.org/tactics/TA0010/"
141
+
142
+ [[rule.threat.technique]]
143
+ id = "T1041"
144
+ name = "Exfiltration Over C2 Channel"
145
+ reference = "https://attack.mitre.org/techniques/T1041/"
146
+
@@ -0,0 +1,123 @@
1
+ [metadata]
2
+ creation_date = "2025/12/04"
3
+ integration = ["network_traffic"]
4
+ maturity = "production"
5
+ updated_date = "2025/12/05"
6
+
7
+ [rule]
8
+ author = ["Elastic"]
9
+ description = """
10
+ This rule detects exploitation attempts targeting CVE-2025-55182, a critical remote code execution vulnerability in
11
+ React Server Components (RSC) Flight protocol. The vulnerability allows attackers to execute arbitrary code on the
12
+ server by sending specially crafted deserialization payloads that exploit prototype chain traversal to access the
13
+ Function constructor. This rule focuses on high-fidelity indicators of active exploitation including successful command
14
+ execution responses and prototype pollution attack patterns.
15
+ """
16
+ from = "now-9m"
17
+ index = ["logs-network_traffic.http*"]
18
+ language = "eql"
19
+ license = "Elastic License v2"
20
+ name = "React2Shell (CVE-2025-55182) Exploitation Attempt"
21
+ note = """## Triage and analysis
22
+
23
+ ### Investigating React2Shell (CVE-2025-55182) Exploitation Attempt
24
+
25
+ This rule detects exploitation attempts targeting CVE-2025-55182, a critical remote code execution vulnerability in React's Flight protocol used by Next.js and other RSC implementations. The vulnerability stems from insecure prototype chain traversal in the Flight deserializer, allowing attackers to access `__proto__`, `constructor`, and ultimately the `Function` constructor to execute arbitrary code.
26
+
27
+ ### Possible investigation steps
28
+
29
+ - Examine the full HTTP request body to identify the specific attack payload and command being executed.
30
+ - Check the response body for `E{"digest":"..."}` patterns which contain command output from successful exploitation.
31
+ - Identify the target application and verify if it runs vulnerable React (< 19.1.0) or Next.js (< 15.3.2) versions.
32
+ - Review the source IP for other reconnaissance or exploitation attempts against web applications.
33
+ - Check for the `Next-Action` header which is required for the exploit to work.
34
+ - Correlate with process execution logs to identify if child processes (e.g., shell commands) were spawned by the Node.js process.
35
+
36
+ ### False positive analysis
37
+
38
+ - Legitimate React Server Components traffic will NOT contain `__proto__`, `constructor:constructor`, or code execution patterns.
39
+ - Security scanning tools like react2shell-scanner may trigger this rule during authorized penetration testing.
40
+ - The combination of prototype pollution patterns with RSC-specific syntax is highly indicative of malicious activity.
41
+
42
+ ### Response and remediation
43
+
44
+ - Immediately update affected applications: React >= 19.1.0, Next.js >= 15.3.2.
45
+ - Block the source IP at the WAF/reverse proxy if exploitation is confirmed.
46
+ - If HTTP 500 or 303 responses with `digest` output were observed, assume successful code execution and investigate for compromise.
47
+ - Review server logs for evidence of command execution (file creation, network connections, process spawning).
48
+ - Implement WAF rules to block requests containing `__proto__` or `constructor:constructor` in POST bodies.
49
+ """
50
+ references = [
51
+ "https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182",
52
+ "https://github.com/assetnote/react2shell-scanner",
53
+ "https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/",
54
+ "https://github.com/msanft/CVE-2025-55182",
55
+ ]
56
+ risk_score = 73
57
+ rule_id = "a8f7e9d4-3b2c-4d5e-8f1a-6c9b0e2d4a7f"
58
+ severity = "high"
59
+ tags = [
60
+ "Domain: Network",
61
+ "Domain: Application",
62
+ "Domain: Web",
63
+ "Use Case: Threat Detection",
64
+ "Use Case: Vulnerability",
65
+ "Tactic: Initial Access",
66
+ "Tactic: Execution",
67
+ "Data Source: Network Packet Capture",
68
+ "Resources: Investigation Guide",
69
+ ]
70
+ timestamp_override = "event.ingested"
71
+ type = "eql"
72
+
73
+ query = '''
74
+ network where http.request.method == "POST" and
75
+ (
76
+ // Successful CVE-2025-55182 RCE - command output in digest
77
+ (
78
+ http.response.status_code in (500, 303) and
79
+ http.response.body.content like~ "*E{\"digest\"*" and
80
+ http.request.body.content regex~ """.*\$[0-9]+:[a-zA-Z_0-9]+:[a-zA-Z_0-9]+.*"""
81
+ ) or
82
+ // Prototype pollution attempts in RSC Flight data (never legitimate)
83
+ (
84
+ http.request.body.content regex~ """.*\$[0-9]+:[a-zA-Z_0-9]+:[a-zA-Z_0-9]+.*""" and
85
+ (
86
+ http.request.body.content like~ "*__proto__*" or
87
+ http.request.body.content like~ "*prototype*"
88
+ )
89
+ )
90
+ )
91
+ '''
92
+
93
+
94
+ [[rule.threat]]
95
+ framework = "MITRE ATT&CK"
96
+ [[rule.threat.technique]]
97
+ id = "T1190"
98
+ name = "Exploit Public-Facing Application"
99
+ reference = "https://attack.mitre.org/techniques/T1190/"
100
+
101
+
102
+ [rule.threat.tactic]
103
+ id = "TA0001"
104
+ name = "Initial Access"
105
+ reference = "https://attack.mitre.org/tactics/TA0001/"
106
+ [[rule.threat]]
107
+ framework = "MITRE ATT&CK"
108
+ [[rule.threat.technique]]
109
+ id = "T1059"
110
+ name = "Command and Scripting Interpreter"
111
+ reference = "https://attack.mitre.org/techniques/T1059/"
112
+ [[rule.threat.technique.subtechnique]]
113
+ id = "T1059.007"
114
+ name = "JavaScript"
115
+ reference = "https://attack.mitre.org/techniques/T1059/007/"
116
+
117
+
118
+
119
+ [rule.threat.tactic]
120
+ id = "TA0002"
121
+ name = "Execution"
122
+ reference = "https://attack.mitre.org/tactics/TA0002/"
123
+
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/07/08"
3
3
  maturity = "production"
4
4
  promotion = true
5
- updated_date = "2025/03/21"
5
+ updated_date = "2025/12/08"
6
6
 
7
7
  [rule]
8
8
  author = ["Elastic"]
@@ -40,7 +40,7 @@ timestamp_override = "event.ingested"
40
40
  type = "query"
41
41
 
42
42
  query = '''
43
- event.kind:alert and not event.module:(endgame or endpoint or cloud_defend)
43
+ (event.kind:alert or data_stream.dataset:wiz.defend) and not event.module:(endgame or endpoint or cloud_defend)
44
44
  '''
45
45
  note = """## Triage and analysis
46
46
 
@@ -2,7 +2,7 @@
2
2
  creation_date = "2020/11/04"
3
3
  integration = ["endpoint", "sentinel_one_cloud_funnel"]
4
4
  maturity = "production"
5
- updated_date = "2025/11/04"
5
+ updated_date = "2025/12/01"
6
6
 
7
7
  [transform]
8
8
  [[transform.investigate]]
@@ -291,8 +291,9 @@ network where host.os.type == "windows" and
291
291
  dns.question.name : ("*.sharepoint.com", "graph.microsoft.com", "g.live.com", "login.live.com")
292
292
  ) or
293
293
 
294
- (process.code_signature.subject_name : "Python Software Foundation" and process.code_signature.trusted == true and
295
- dns.question.name : "files.pythonhosted.org") or
294
+ (process.code_signature.subject_name : ("Python Software Foundation", "Anaconda, Inc.") and
295
+ process.code_signature.trusted == true and dns.question.name : "files.pythonhosted.org"
296
+ ) or
296
297
 
297
298
  /* Zoom */
298
299
  (process.name : "Zoom.exe" and (process.code_signature.subject_name : "Zoom Video Communications, Inc." and