Skip to content

Conversation

@Samirbous
Copy link
Contributor

  • Bash Shell Profile Modification - remove rename from event.action and uses file.name for better matches).
  • Web Shell Detection: Script Process Child of Common Web Processes - extra tuning to reduce FPs

@Samirbous Samirbous self-assigned this Dec 17, 2025
@Samirbous Samirbous added the Rule: Tuning tweaking or tuning an existing rule label Dec 17, 2025
@botelastic botelastic bot added Domain: Endpoint OS: Windows windows related rules labels Dec 17, 2025
@Samirbous Samirbous requested a review from w0rk3r December 17, 2025 10:40
@github-actions
Copy link
Contributor

Rule: Tuning - Guidelines

These guidelines serve as a reminder set of considerations when tuning an existing rule.

Documentation and Context

  • Detailed description of the suggested changes.
  • Provide example JSON data or screenshots.
  • Provide evidence of reducing benign events mistakenly identified as threats (False Positives).
  • Provide evidence of enhancing detection of true threats that were previously missed (False Negatives).
  • Provide evidence of optimizing resource consumption and execution time of detection rules (Performance).
  • Provide evidence of specific environment factors influencing customized rule tuning (Contextual Tuning).
  • Provide evidence of improvements made by modifying sensitivity by changing alert triggering thresholds (Threshold Adjustments).
  • Provide evidence of refining rules to better detect deviations from typical behavior (Behavioral Tuning).
  • Provide evidence of improvements of adjusting rules based on time-based patterns (Temporal Tuning).
  • Provide reasoning of adjusting priority or severity levels of alerts (Severity Tuning).
  • Provide evidence of improving quality integrity of our data used by detection rules (Data Quality).
  • Ensure the tuning includes necessary updates to the release documentation and versioning.

Rule Metadata Checks

  • updated_date matches the date of tuning PR merged.
  • min_stack_version should support the widest stack versions.
  • name and description should be descriptive and not include typos.
  • query should be inclusive, not overly exclusive. Review to ensure the original intent of the rule is maintained.

Testing and Validation

  • Validate that the tuned rule's performance is satisfactory and does not negatively impact the stack.
  • Ensure that the tuned rule has a low false positive rate.

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@botelastic botelastic bot added the OS: Linux label Dec 17, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

severity = "high"
tags = [
"OS: Windows",
"Data Source: Elastic Endgame",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

severity = "low"
tags = [
"OS: Windows",
"Data Source: Elastic Endgame",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

@@ -1,8 +1,8 @@
[metadata]
creation_date = "2023/10/16"
integration = ["problemchild", "endpoint"]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this include windows?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it will just add unnecessary noise, the rule require fixes at the ML level, this tuning purpose is to reduce the flooding.

/*
This rule does not exclude local IP ranges by default. To exclude these, use the following exclusion statement:
cidrmatch(destination.ip, "10.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.0.0/29", "192.0.0.8/32", "192.0.0.9/32",
not cidrmatch(destination.ip, "127.0.0.0/8", "::1","FE80::/10", "FF00::/8", "10.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.0.0/29", "192.0.0.8/32", "192.0.0.9/32",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No longer detecting internal c2 right?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

99% of the noise is from internal apps, difficult to spot internal C2 in all the noise using this logic.

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Internal Linux SSH Brute Force Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Internal Linux SSH Brute Force Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport: auto Domain: Endpoint OS: Linux OS: Windows windows related rules Rule: Tuning tweaking or tuning an existing rule

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants