Elastic Rules
1. 介绍
内置100+检测规则可直接使用,如下图:
2. 案例
检测计划任务(scheduled task)是否被创建
- Rule type:EQL
- Rule indices:
- winlogbeat-*
- logs-system.*
- Severity:Low
- Risk score:21
- Runs every:5 min
- Searches indices from:now-9m
- Maximum alerts per execution:100
- References:https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4698
- Potential false positives:安装新软件时,也可能触发创建合法的计划任务
- 规则:
iam where event.action == "scheduled-task-created" and /* excludingtasks created by the computer account */ not user.name : "*$" and/* TaskContent is not parsed, exclude by full taskname noisy ones */not winlog.event_data.TaskName : ("\\OneDrive StandaloneUpdate Task-S-1-5-21*", "\\Hewlett-Packard\\HP WebProducts Detection", "\\Hewlett-Packard\\HPDeviceCheck")
- Framework: MITRE ATT&CKTM
- Tactic:
- Name: Persistence
- ID: TA0003
- Reference URL: https://attack.mitre.org/tactics/TA0003/
- Technique:
- Name: Scheduled Task/Job
- ID: T1053
- Reference URL: https://attack.mitre.org/techniques/T1053/
- Tactic:
3. 参考资料
Edit this page
Last updated on 4/9/2023