Skip to content

Commit ab89dfb

Browse files
authored
[Rule Tuning] Tighten Up Elastic Defend Indexes - MacOS (elastic#4447)
1 parent 3e0ba33 commit ab89dfb

File tree

30 files changed

+60
-60
lines changed

30 files changed

+60
-60
lines changed

rules/macos/credential_access_credentials_keychains.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/14"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ for macOS to keep track of users' passwords and credentials for many services an
1212
websites, secure notes and certificates.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.process*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Access to Keychain Credentials Directories"

rules/macos/credential_access_dumping_keychain_security.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/01/04"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ built-in way for macOS to keep track of users' passwords and credentials for man
1212
and website passwords, secure notes, certificates, and Kerberos.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.process*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Dumping of Keychain Content via Security Command"

rules/macos/credential_access_keychain_pwd_retrieval_security_cmd.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/01/06"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -13,7 +13,7 @@ and website passwords, secure notes, certificates, and Kerberos.
1313
"""
1414
false_positives = ["Applications for password management."]
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.*"]
16+
index = ["logs-endpoint.events.process*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Keychain Password Retrieval via Command Line"

rules/macos/credential_access_promt_for_pwd_via_osascript.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/16"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,7 +11,7 @@ Identifies the use of osascript to execute scripts via standard input that may p
1111
credentials.
1212
"""
1313
from = "now-9m"
14-
index = ["logs-endpoint.events.*"]
14+
index = ["logs-endpoint.events.process*"]
1515
language = "eql"
1616
license = "Elastic License v2"
1717
name = "Prompt for Credentials with OSASCRIPT"

rules/macos/defense_evasion_attempt_del_quarantine_attrib.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/14"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ downloaded from the internet, there is a quarantine flag set on the file. This a
1212
defense program at execution time. An adversary may disable this attribute to evade defenses.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.file*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Quarantine Attrib Removed by Unsigned or Untrusted Process"

rules/macos/defense_evasion_privacy_controls_tcc_database_modification.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/12/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ indicate an attempt to bypass macOS privacy controls, including access to sensit
1212
microphone, address book, and calendar.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.process*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Potential Privacy Control Bypass via TCCDB Modification"

rules/macos/defense_evasion_privilege_escalation_privacy_pref_sshd_fulldiskaccess.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/01/11"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ Daemon (sshd) to the authorized application list for Full Disk Access. This may
1212
privacy controls to access sensitive files.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.process*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Potential Privacy Control Bypass via Localhost Secure Copy"

rules/macos/discovery_users_domain_built_in_commands.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/01/12"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,7 +11,7 @@ Identifies the execution of macOS built-in commands related to account or group
1111
and group information to orient themselves before deciding how to act.
1212
"""
1313
from = "now-9m"
14-
index = ["logs-endpoint.events.*"]
14+
index = ["logs-endpoint.events.process*"]
1515
language = "eql"
1616
license = "Elastic License v2"
1717
name = "Enumeration of Users or Groups via Built-in Commands"

rules/macos/execution_initial_access_suspicious_browser_childproc.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/12/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ visiting a website over the normal course of browsing. With this technique, the
1212
for exploitation.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.*"]
15+
index = ["logs-endpoint.events.process*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Suspicious Browser Child Process"

rules/macos/execution_installer_package_spawned_network_event.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/02/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -20,7 +20,7 @@ false_positives = [
2020
""",
2121
]
2222
from = "now-9m"
23-
index = ["logs-endpoint.events.*"]
23+
index = ["logs-endpoint.events.network*", "logs-endpoint.events.process*"]
2424
language = "eql"
2525
license = "Elastic License v2"
2626
name = "MacOS Installer Package Spawns Network Event"

0 commit comments

Comments
 (0)