Skip to content

Conversation

@Aegrah
Copy link
Contributor

@Aegrah Aegrah commented Dec 17, 2025

Pull Request Summary

Why

This PR updates and enhances several Linux credential access detection rules, with a focus on improving detection accuracy, expanding data source coverage, increasing risk prioritization, and deprecating certain rules.


What changed

  • General Enhancements

    • Many rules now include additional integrations: auditd_manager and sentinel_one_cloud_funnel.
    • Index patterns expanded to cover more log sources (e.g., logs-auditd_manager.auditd-*, logs-sentinel_one_cloud_funnel.*, endgame-*, auditbeat-*).
    • New terms detection fields updated (e.g., from host.id to agent.id).
    • History window durations for new terms shortened (e.g., from 10d to 5d).
    • More event actions and process names included in detection logic for broader coverage.
    • Several rules have increased risk scores and severity levels (e.g., from "medium" to "high", risk score from 47 to 73).
  • Rule-Specific Notes

    • credential_access_aws_creds_search_inside_container.toml
      • Severity increased to "high" and risk score to 73.
      • Expanded process names to include cat, sed, and awk.
    • credential_access_collection_sensitive_files.toml
      • Added integrations for auditd_manager and sentinel_one_cloud_funnel.
      • Broader index and event action coverage.
      • New terms now use agent.id.
      • History window shortened to 5d.
    • credential_access_collection_sensitive_files_compression_inside_container.toml
      • Severity increased to "high" and risk score to 73.
    • credential_access_credential_dumping.toml
      • Severity increased to "high" and risk score to 73.
    • credential_access_gdb_init_process_hooking.toml
      • Added auditd_manager integration and index.
      • Severity increased to "high" and risk score to 73.
      • Broader event action coverage.
    • credential_access_gh_auth_via_nodejs.toml
      • Added endgame-* to index.
      • Broader event action coverage.
    • credential_access_kubernetes_service_account_secret_access.toml
      • Broader exclusions to reduce false positives (e.g., specific command lines, working directories, and parent processes).
    • credential_access_manual_memory_dumping.toml
      • Added auditd_manager integration and index.
      • Severity increased to "high" and risk score to 73.
      • Broader event action coverage.
    • credential_access_potential_linux_local_account_bruteforce.toml
      • Changed from EQL to ESQL.
      • Added interval and new ESQL query logic for more robust brute force detection.
      • Broader parent process exclusions.
    • credential_access_potential_linux_ssh_bruteforce_external.toml and credential_access_potential_linux_ssh_bruteforce_internal.toml
      • Changed from EQL to ESQL.
      • Added interval and new ESQL query logic for more robust brute force detection.
      • Broader field coverage and improved statistics for event grouping.
    • credential_access_potential_successful_linux_ftp_bruteforce.toml and credential_access_potential_successful_linux_rdp_bruteforce.toml
      • Both rules are now marked as Deprecated.
      • Investigation notes updated to clarify deprecation and provide detailed triage, false positive, and response guidance.

Behavioral impact

  • Increased detection coverage for credential access and brute force attempts across more data sources and event types.
  • Higher severity and risk scores will prioritize these alerts in SOC workflows.
  • Deprecated rules will no longer be maintained; users should migrate to newer alternatives.
  • More robust brute force detection using ESQL and improved event grouping/statistics.

Risks/edge cases

  • Expanding index patterns and integrations could introduce noise if new data sources are not properly filtered or normalized.
  • Changing new terms fields and history windows may affect alert frequency and baseline calculations.
  • Broader event action and process name coverage could increase false positives if not carefully tuned.
  • Deprecated rules may still be in use in some environments; ensure migration to supported rules.

Rollout notes

  • Ensure new data sources are ingested and mapped correctly before enabling updated rules.
  • Monitor for increased alert volume or false positives after deployment.
  • Communicate changes in detection logic, severity, and deprecation status to SOC analysts.
  • Consider phased rollout or additional tuning if noise increases.
  • Review and update any playbooks or automations that reference deprecated rules.

@Aegrah Aegrah self-assigned this Dec 17, 2025
@Aegrah Aegrah added OS: Linux Rule: Tuning tweaking or tuning an existing rule Team: TRADE labels Dec 17, 2025
@github-actions
Copy link
Contributor

Rule: Tuning - Guidelines

These guidelines serve as a reminder set of considerations when tuning an existing rule.

Documentation and Context

  • Detailed description of the suggested changes.
  • Provide example JSON data or screenshots.
  • Provide evidence of reducing benign events mistakenly identified as threats (False Positives).
  • Provide evidence of enhancing detection of true threats that were previously missed (False Negatives).
  • Provide evidence of optimizing resource consumption and execution time of detection rules (Performance).
  • Provide evidence of specific environment factors influencing customized rule tuning (Contextual Tuning).
  • Provide evidence of improvements made by modifying sensitivity by changing alert triggering thresholds (Threshold Adjustments).
  • Provide evidence of refining rules to better detect deviations from typical behavior (Behavioral Tuning).
  • Provide evidence of improvements of adjusting rules based on time-based patterns (Temporal Tuning).
  • Provide reasoning of adjusting priority or severity levels of alerts (Severity Tuning).
  • Provide evidence of improving quality integrity of our data used by detection rules (Data Quality).
  • Ensure the tuning includes necessary updates to the release documentation and versioning.

Rule Metadata Checks

  • updated_date matches the date of tuning PR merged.
  • min_stack_version should support the widest stack versions.
  • name and description should be descriptive and not include typos.
  • query should be inclusive, not overly exclusive. Review to ensure the original intent of the rule is maintained.

Testing and Validation

  • Validate that the tuned rule's performance is satisfactory and does not negatively impact the stack.
  • Ensure that the tuned rule has a low false positive rate.

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Copy link
Contributor

@Mikaayenson Mikaayenson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lot of reasonable tunings in here. No notes. I didn't notice the query conversion eql-->sql slightly changing semantics (10 runs vs 25 counts), but still no big concern. Should be g2g when the CI passes.

Copy link
Contributor

@eric-forte-elastic eric-forte-elastic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🟢 Manual review, looks good to me! 👍

Comment on lines 74 to 75
Esql.agent_id_values = values(agent.id),
Esql.event_dataset_values = values(event.dataset),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

those 2 are already defined : agent.id is in the aggregation and dataset is in the query index logs-endpoint.events.process*

)
] with runs=10
from logs-endpoint.events.process* metadata _id, _index, _version
| mv_expand event.action
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you will need to add | eval time_window = DATE_TRUNC(1 minute, @timestamp) or 30s to have similar behavior as maxspan with the adequate threshold, but from telm it seems like the rule is not very noisy, instead of converting it to ESQL just add a condition on process.args_count <= 2

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added the eval with 1 minute.

by process.parent.executable, agent.id, user.id
| where Esql.event_count >= 25
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

too high compared to if you just dropped args_count <= 2

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is way more efficient, and a brute force will very likely exceed this number. However, I bumped it down to the original >= 10 as the rule was doing fine; this is just a performance increase.

"192.0.2.0/24", "192.31.196.0/24", "192.52.193.0/24", "192.168.0.0/16", "192.88.99.0/24", "224.0.0.0/4",
"100.64.0.0/10", "192.175.48.0/24","198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4",
"::1", "FE80::/10", "FF00::/8") ] with runs = 10
from "filebeat-*", "logs-system.auth-*" metadata _id, _index, _version
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it may error because of the multi-index (if one is missing), you will also need to add the | eval time_window = DATE_TRUNC(30 seconds, @timestamp) and set the Esql.event_count >= 60 to reduce noise (try it on telm and you will see with 25 it will remain noisy)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bumped to 60.

it may error because of the multi-index (if one is missing)

That's a good call, though. Because of this reason, we probably shouldn't even convert to ESQL. Will discuss this via Slack.

Esql.event_dataset_values = values(event.dataset),
Esql.data_stream_namespace_values = values(data_stream.namespace)
by source.ip, agent.id, user.name
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should by source.ip, agent.id to be similar to the previous logic, by user.name will miss attempt to brute-force multi accounts using same pwd.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussed this on Slack, will create a new rule for password spraying and keep this one as we had it previously (on source.ip, agent.id and user.name)

[authentication where host.os.type == "linux" and event.action in ("ssh_login", "user_login") and
event.outcome == "failure" and source.ip != null and source.ip != "0.0.0.0" and source.ip != "::" ] with runs=10
event.outcome == "failure" and source.ip != null and source.ip != "0.0.0.0" and source.ip != "::" ] with runs=25
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

have u tried to use ES|QL on the telem rule to see if 25 will reduce noise or not ?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we can write an ESQL rule on a sequence from failed --> success? We can write one to say failure X and success Y, but no sequencing, which makes it not really a way to detect the succesful piece of the brute force attack.

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Removed 'auditbeat-*' from the index list.
@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Removed redundant event.action expansion and filtering logic.
@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Refactor ESQL query to improve readability and maintainability by moving the event.action expansion and filtering logic.
@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 23, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 24, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 24, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 24, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 24, 2025

⛔️ Test failed

Results
  • ❌ Potential Internal Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Keys Or Passwords Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux RDP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AWS Credentials Searched For Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Manual Memory Dumping via Proc Filesystem (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Deprecated - Potential Successful Linux FTP Brute Force Attack Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Sensitive Files Compression (kuery)
  • ❌ Potential Linux Local Account Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Successful SSH Brute Force Attack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kubernetes Service Account Secret Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Linux init (PID 1) Secret Dump via GDB (eql)
  • ❌ Sensitive Files Compression Inside A Container (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ GitHub Authentication Token Access via Node.js (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Linux Credential Dumping via Unshadow (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Potential Linux Credential Dumping via Proc Filesystem (eql)
  • ❌ Potential OpenSSH Backdoor Logging Activity (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential External Linux SSH Brute Force Detected (esql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants