-
Notifications
You must be signed in to change notification settings - Fork 613
[New] Alerts in Different ATT&CK Tactics by Host #5343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Using ES|QL and alerts risk score to identify top risky hosts based on presence of multiple alert touching at least 4 unique tactics in a 24h time Window.
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
Isn't this quite similar to Multiple Alerts in Different ATT&CK Tactics on a Single Host? Although I would say this logic is better, since the other rule logic could be triggered by a single alert having 3 different ATT&CK tactics. Wouldn't it make sense to deprecate the other detection rule? |
I would say they are slightly different, the new one should be less noisier as it has more restrictive conditions to reduce FPs (higher risk score of the alerts, less than 500 alert per rule to reduce the impact of the noisy ones and at least 5 unique rules): Instead of deprecating you can just disable it. Maybe after sometime if we judge the new one is good in term of perf and FP rate we can deprecate the new term one. |
True, however - I would even argue that the logic of the old one isn't correct as it stands right now, as it doesn't require "Multiple Alerts", but a single alert with 3 tactics could also trigger the detection. So, it would likely have to be rewritten to ES|QL to add another cardinality threshold for the amount of unique alert rule names. |
good catch, we will push a tuning for the threshold rule. |
Using ES|QL and alerts risk score to identify top risky hosts based on presence of multiple alert touching at least 4 unique tactics in a 24h time Window.