Skip to content

Conversation

Samirbous
Copy link
Contributor

@Samirbous Samirbous commented Jan 31, 2025

Resolves https://github.com/elastic/security/issues/6114

  • New rule using 8.15 file events with MOTW info we can focus on js/vbs/wsh/vbe/jse/hta downloaded from internet followed by execution.
  • tuned existing rules to close some reported H1 gaps (expanded winscript->ps rule to cmd.exe and conhost), (added an assembly.load pattern).
using 8.15 file events with MOTW info we can focus on js/vbs/wsh/vbe/jse/hta downloaded from internet followed by execution
@Samirbous Samirbous added Rule: New Proposal for new rule OS: Windows windows related rules labels Jan 31, 2025
@Samirbous Samirbous self-assigned this Jan 31, 2025
Copy link
Contributor

Rule: New - Guidelines

These guidelines serve as a reminder set of considerations when proposing a new rule.

Documentation and Context

  • Detailed description of the rule.
  • List any new fields required in ECS/data sources.
  • Link related issues or PRs.
  • Include references.

Rule Metadata Checks

  • creation_date matches the date of creation PR initially merged.
  • min_stack_version should support the widest stack versions.
  • name and description should be descriptive and not include typos.
  • query should be inclusive, not overly exclusive, considering performance for diverse environments. Non ecs fields should be added to non-ecs-schema.json if not available in an integration.
  • min_stack_comments and min_stack_version should be included if the rule is only compatible starting from a specific stack version.
  • index pattern should be neither too specific nor too vague, ensuring it accurately matches the relevant data stream (e.g., use logs-endpoint.process-* for process data).
  • integration should align with the index. If the integration is newly introduced, ensure the manifest, schemas, and new_rule.yaml template are updated.
  • setup should include the necessary steps to configure the integration.
  • note should include any additional information (e.g. Triage and analysis investigation guides, timeline templates).
  • tags should be relevant to the threat and align/added to the EXPECTED_RULE_TAGS in the definitions.py file.
  • threat, techniques, and subtechniques should map to ATT&CK always if possible.

New BBR Rules

  • building_block_type should be included if the rule is a building block and the rule should be located in the rules_building_block folder.
  • bypass_bbr_timing should be included if adding custom lookback timing to the rule.

Testing and Validation

  • Provide evidence of testing and detecting the expected threat.
  • Check for existence of coverage to prevent duplication.
@Samirbous Samirbous changed the title [New] Execution of a downloaded windows script [Tuning / New] Execution of a downloaded windows script Jan 31, 2025
Copy link
Contributor

@Aegrah Aegrah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@Samirbous Samirbous merged commit 8f73b88 into main Feb 3, 2025
9 checks passed
@Samirbous Samirbous deleted the H1WSC branch February 3, 2025 14:34
traut pushed a commit that referenced this pull request Feb 19, 2025
* [New] Execution of a downloaded windows script using 8.15 file events with MOTW info we can focus on js/vbs/wsh/vbe/jse/hta downloaded from internet followed by execution * Update defense_evasion_posh_assembly_load.toml * Update execution_powershell_susp_args_via_winscript.toml * Update guides * Update defense_evasion_network_connection_from_windows_binary.toml * Update execution_windows_script_from_internet.toml * Update execution_windows_script_from_internet.toml * Update rules/windows/execution_windows_script_from_internet.toml * Update rules/windows/execution_powershell_susp_args_via_winscript.toml Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com> * Update rules/windows/execution_windows_script_from_internet.toml Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com> * Update execution_windows_script_from_internet.toml * Create command_and_control_tool_transfer_via_curl.toml * Update command_and_control_tool_transfer_via_curl.toml * Update command_and_control_tool_transfer_via_curl.toml * Update execution_windows_script_from_internet.toml * Create defense_evasion_indirect_exec_forfiles.toml * Update execution_windows_script_from_internet.toml --------- Co-authored-by: Mika Ayenson <Mika.ayenson@elastic.co> Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3 participants