Skip to content

Commit 818467f

Browse files
Replace master doc URLs with current (#4439)
1 parent 8f73b88 commit 818467f

File tree

140 files changed

+290
-289
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+290
-289
lines changed

detection_rules/packaging.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ def _generate_registry_package(self, save_dir):
427427
The detection rules package stores the prebuilt security rules for the Elastic Security [detection engine](https://www.elastic.co/guide/en/security/7.13/detection-engine-overview.html).
428428
429429
To download or update the rules, click **Settings** > **Install Prebuilt Security Detection Rules assets**.
430-
Then [import](https://www.elastic.co/guide/en/security/master/rules-ui-management.html#load-prebuilt-rules)
430+
Then [import](https://www.elastic.co/guide/en/security/current/rules-ui-management.html#load-prebuilt-rules)
431431
the rules into the Detection engine.
432432
433433
## License Notice

pyproject.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "0.4.6"
3+
version = "0.4.7"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/integrations/aws/credential_access_new_terms_secretsmanager_getsecretvalue.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/07/06"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/22"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Nick Jones", "Elastic"]
@@ -33,7 +33,7 @@ note = """## Triage and analysis
3333
3434
AWS Secrets Manager is a service that enables the replacement of hardcoded credentials in code, including passwords, with an API call to Secrets Manager to retrieve the secret programmatically.
3535
36-
This rule looks for the retrieval of credentials using `GetSecretValue` action in Secrets Manager programmatically. This is a [New Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule indicating this is the first time a specific user identity has successfuly retrieved a specific secret value from Secrets Manager within the last 15 days.
36+
This rule looks for the retrieval of credentials using `GetSecretValue` action in Secrets Manager programmatically. This is a [New Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule indicating this is the first time a specific user identity has successfuly retrieved a specific secret value from Secrets Manager within the last 15 days.
3737
3838
#### Possible investigation steps
3939

rules/integrations/aws/credential_access_rapid_secret_retrieval_attempts_from_secretsmanager.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/04/11"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2024/12/19"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ note = """## Triage and analysis
2828
2929
AWS Secrets Manager is a service that enables the replacement of hardcoded credentials in code, including passwords, with an API call to Secrets Manager to retrieve the secret programmatically.
3030
31-
This rule looks for the rapid retrieval of credentials using `GetSecretValue` or `BatchGetSecretValue` actions in Secrets Manager programmatically. This is a [Threshold](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-threshold-rule) rule indicating 20 or more successful attempts to retrieve a secret value from Secrets Manager by the same user identity within a short timespan.
31+
This rule looks for the rapid retrieval of credentials using `GetSecretValue` or `BatchGetSecretValue` actions in Secrets Manager programmatically. This is a [Threshold](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-threshold-rule) rule indicating 20 or more successful attempts to retrieve a secret value from Secrets Manager by the same user identity within a short timespan.
3232
3333
#### Possible investigation steps
3434

rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/24"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/17"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Elastic"]
@@ -31,7 +31,7 @@ note = """## Triage and analysis
3131
AWS Security Token Service (AWS STS) is a service that enables you to request temporary, limited-privilege credentials for users.
3232
The `GetCallerIdentity` function returns details about the IAM user or role owning the credentials used to call the operation.
3333
No permissions are required to run this operation and the same information is returned even when access is denied.
34-
This rule looks for use of the `GetCallerIdentity` operation. This is a [New Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule indicating this is the first time a specific user identity has called this operation within the last 15 days.
34+
This rule looks for use of the `GetCallerIdentity` operation. This is a [New Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule indicating this is the first time a specific user identity has called this operation within the last 15 days.
3535
3636
#### Possible investigation steps
3737

rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["aws"]
44
maturity = "production"
55
min_stack_comments = "ES|QL rule type in technical preview as of 8.13"
66
min_stack_version = "8.13.0"
7-
updated_date = "2025/01/15"
7+
updated_date = "2025/02/03"
88

99
[rule]
1010
author = ["Elastic"]
@@ -27,7 +27,7 @@ note = """
2727
### Investigating AWS S3 Object Encryption Using External KMS Key
2828
2929
This rule detects the use of an external AWS KMS key to encrypt objects within an S3 bucket. Adversaries with access to a misconfigured S3 bucket may use an external key to copy objects within a bucket and deny victims the ability to access their own data.
30-
This rule uses [ES|QL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-esql-rule) to look for use of the `CopyObject` operation where the target bucket's `cloud.account.id` is different from the `key.account.id` dissected from the AWS KMS key used for encryption.
30+
This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule) to look for use of the `CopyObject` operation where the target bucket's `cloud.account.id` is different from the `key.account.id` dissected from the AWS KMS key used for encryption.
3131
3232
#### Possible Investigation Steps:
3333

rules/integrations/aws/impact_s3_object_versioning_disabled.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/07/12"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Elastic"]
@@ -26,7 +26,7 @@ note = """
2626
### Investigating AWS S3 Object Versioning Suspended
2727
2828
This rule detects when object versioning for an S3 bucket is suspended. Adversaries with access to a misconfigured S3 bucket may disable object versioning prior to replacing or deleting S3 objects, inhibiting recovery initiatives.
29-
This rule uses [EQL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-eql-rule) to look for use of the `PutBucketVersioning` operation where the `request_parameters` include `Status=Suspended`.
29+
This rule uses [EQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-eql-rule) to look for use of the `PutBucketVersioning` operation where the `request_parameters` include `Status=Suspended`.
3030
3131
#### Possible Investigation Steps:
3232

rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/13"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2024/12/10"
5+
updated_date = "2025/02/03"
66
min_stack_comments = "ES|QL rule type in technical preview as of 8.13"
77
min_stack_version = "8.13.0"
88

@@ -29,7 +29,7 @@ note = """## Triage and analysis
2929
3030
AWS access keys created for IAM users or root user are long-term credentials that provide programmatic access to AWS.
3131
With access to the `iam:CreateAccessKey` permission, a set of compromised credentials could be used to create a new
32-
set of credentials for another user for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-esql-rule)
32+
set of credentials for another user for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3333
to look for use of the `CreateAccessKey` operation where the user.name is different from the user.target.name.
3434
3535

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2024/10/09"
5+
updated_date = "2025/02/03"
66
min_stack_comments = "ES|QL rule type in technical preview as of 8.13."
77
min_stack_version = "8.13.0"
88

@@ -31,7 +31,7 @@ note = """## Triage and analysis
3131
3232
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3333
With access to the `iam:AttachGroupPolicy` permission, a set of compromised credentials could be used to attach
34-
this policy to the current user's groups for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-esql-rule)
34+
this policy to the current user's groups for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3535
to look for use of the `AttachGroupPolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3636
3737

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2024/10/09"
5+
updated_date = "2025/02/03"
66
min_stack_comments = "ES|QL rule type in technical preview as of 8.13."
77
min_stack_version = "8.13.0"
88

@@ -30,7 +30,7 @@ note = """## Triage and analysis
3030
3131
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3232
With access to the `iam:AttachRolePolicy` permission, a set of compromised credentials could be used to attach
33-
this policy to a compromised role for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-esql-rule)
33+
this policy to a compromised role for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3434
to look for use of the `AttachRolePolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3535
3636

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/30"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2024/11/07"
5+
updated_date = "2025/02/03"
66
min_stack_comments = "ES|QL rule type in technical preview as of 8.13."
77
min_stack_version = "8.13.0"
88

@@ -30,7 +30,7 @@ note = """## Triage and analysis
3030
3131
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3232
With access to the `iam:AttachUserPolicy` permission, a set of compromised credentials could be used to attach
33-
this policy to the current user for privilege escalation or another user as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-esql-rule)
33+
this policy to the current user for privilege escalation or another user as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3434
to look for use of the `AttachUserPolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3535
3636

rules/integrations/okta/defense_evasion_first_occurence_public_app_client_credential_token_exchange.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/09/11"
33
integration = ["okta"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/03"
66
min_stack_version = "8.15.0"
77
min_stack_comments = "Breaking change at 8.15.0 for the Okta Integration."
88

@@ -13,7 +13,7 @@ Identifies a failed OAuth 2.0 token grant attempt for a public client app using
1313
generated when a public client app attempts to exchange a client credentials grant for an OAuth 2.0 access token, but
1414
the request is denied due to the lack of required scopes. This could indicate compromised client credentials in which an
1515
adversary is attempting to obtain an access token for unauthorized scopes. This is a [New
16-
Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule where the
16+
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule where the
1717
`okta.actor.display_name` field value has not been seen in the last 14 days regarding this event.
1818
"""
1919
from = "now-9m"

rules/linux/command_and_control_cat_network_activity.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/09/04"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/03"
66

77
[transform]
88
[[transform.osquery]]
@@ -52,7 +52,7 @@ Attackers may leverage the `cat` utility in conjunction with a listener to read
5252
This rule looks for a sequence of a `cat` execution event followed by a network connection attempt by the same `cat` process.
5353
5454
> **Note**:
55-
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/master/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
55+
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/current/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
5656
> This investigation guide uses [placeholder fields](https://www.elastic.co/guide/en/security/current/osquery-placeholder-fields.html) to dynamically pass alert data into Osquery queries. Placeholder fields were introduced in Elastic Stack version 8.7.0. If you're using Elastic Stack version 8.6.0 or earlier, you'll need to manually adjust this investigation guide's queries to ensure they properly run.
5757
5858
#### Possible investigation steps

rules/linux/command_and_control_linux_chisel_client_activity.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/08/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/24"
5+
updated_date = "2025/02/03"
66

77
[transform]
88
[[transform.osquery]]
@@ -53,7 +53,7 @@ Attackers can leverage `chisel` to clandestinely tunnel network communications a
5353
This rule looks for a sequence of command line arguments that are consistent with `chisel` client tunneling behavior, followed by a network event by an uncommon process.
5454
5555
> **Note**:
56-
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/master/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
56+
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/current/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
5757
> This investigation guide uses [placeholder fields](https://www.elastic.co/guide/en/security/current/osquery-placeholder-fields.html) to dynamically pass alert data into Osquery queries. Placeholder fields were introduced in Elastic Stack version 8.7.0. If you're using Elastic Stack version 8.6.0 or earlier, you'll need to manually adjust this investigation guide's queries to ensure they properly run.
5858
5959
#### Possible investigation steps

rules/linux/command_and_control_linux_chisel_server_activity.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/08/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/03"
66

77
[transform]
88
[[transform.osquery]]
@@ -53,7 +53,7 @@ Attackers can leverage `chisel` to clandestinely tunnel network communications a
5353
This rule looks for a sequence of command line arguments that are consistent with `chisel` server tunneling behavior, followed by a network event by an uncommon process.
5454
5555
> **Note**:
56-
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/master/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
56+
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/current/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
5757
> This investigation guide uses [placeholder fields](https://www.elastic.co/guide/en/security/current/osquery-placeholder-fields.html) to dynamically pass alert data into Osquery queries. Placeholder fields were introduced in Elastic Stack version 8.7.0. If you're using Elastic Stack version 8.6.0 or earlier, you'll need to manually adjust this investigation guide's queries to ensure they properly run.
5858
5959
#### Possible investigation steps

rules/linux/command_and_control_linux_proxychains_activity.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint", "auditd_manager", "crowdstrike", "sentinel_one_cloud_
44
maturity = "production"
55
min_stack_version = "8.13.0"
66
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
7-
updated_date = "2025/01/15"
7+
updated_date = "2025/02/03"
88

99
[transform]
1010
[[transform.osquery]]
@@ -54,7 +54,7 @@ Attackers can leverage `proxychains` to obfuscate their origin and bypass networ
5454
This rule looks for processes spawned through `proxychains` by analyzing `proxychains` process execution.
5555
5656
> **Note**:
57-
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/master/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
57+
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/current/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
5858
> This investigation guide uses [placeholder fields](https://www.elastic.co/guide/en/security/current/osquery-placeholder-fields.html) to dynamically pass alert data into Osquery queries. Placeholder fields were introduced in Elastic Stack version 8.7.0. If you're using Elastic Stack version 8.6.0 or earlier, you'll need to manually adjust this investigation guide's queries to ensure they properly run.
5959
6060
#### Possible investigation steps

rules/linux/command_and_control_linux_ssh_x11_forwarding.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint", "crowdstrike", "sentinel_one_cloud_funnel"]
44
maturity = "production"
55
min_stack_version = "8.13.0"
66
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
7-
updated_date = "2025/01/17"
7+
updated_date = "2025/02/03"
88

99
[transform]
1010
[[transform.osquery]]
@@ -54,7 +54,7 @@ Attackers can leverage SSH X11 forwarding to capture a user's graphical desktop
5454
This rule looks for the execution of SSH in conjunction with command line arguments that are capable of setting up X11 forwarding.
5555
5656
> **Note**:
57-
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/master/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
57+
> This investigation guide uses the [Osquery Markdown Plugin](https://www.elastic.co/guide/en/security/current/invest-guide-run-osquery.html) introduced in Elastic Stack version 8.5.0. Older Elastic Stack versions will display unrendered Markdown in this guide.
5858
> This investigation guide uses [placeholder fields](https://www.elastic.co/guide/en/security/current/osquery-placeholder-fields.html) to dynamically pass alert data into Osquery queries. Placeholder fields were introduced in Elastic Stack version 8.7.0. If you're using Elastic Stack version 8.6.0 or earlier, you'll need to manually adjust this investigation guide's queries to ensure they properly run.
5959
6060
#### Possible investigation steps

0 commit comments

Comments
 (0)