elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.92k stars 492 forks source link

[New] Detonate LNK TOP Rules #4058

Closed Samirbous closed 3 weeks ago

Samirbous commented 1 month ago

the following two Elastic Defend endpoint rules are the top ones matching on TPs and SIEM FNs from detonate for LNK files, converting them to SIEM rules compatible with Sysmon/Winlogbeat, SentinelOne and M365 Defender datasources :

https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_powershell_execution.toml#L8

https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_windows_command_shell_execution.toml#L8

NB: I've omitted Elastic Defend and Endgame as datasources to avoid alert duplicates (if a user has one of those integration enabled it won't bring value to have SIEM and Endpoint alert for the same thing).

protectionsmachine commented 1 month ago

Rule: New - Guidelines

These guidelines serve as a reminder set of considerations when proposing a new rule.

Documentation and Context

Rule Metadata Checks

New BBR Rules

Testing and Validation

Samirbous commented 3 weeks ago

We can make these fields optional (?field), but if these exclusions are noisy, you may want to use different fields to filter them out.

removed exclusions in favour of compatibility