Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Hunt Tuning] Add Descriptions, Collapse Queries and Re-Generate Docs #3791

Merged
merged 70 commits into from
Jun 25, 2024
Merged
Show file tree
Hide file tree
Changes from 42 commits
Commits
Show all changes
70 commits
Select commit Hold shift + click to select a range
113ea0d
add description to hunting schema; change queries to be a list
terrancedejesus Jun 13, 2024
002ce9c
update createremotethreat by process hunt
terrancedejesus Jun 13, 2024
00f5332
update dll hijack and masquerading as MSFT library
terrancedejesus Jun 13, 2024
b055d7b
remove sysmon specific dDLL hijack via masquerading MSFT library
terrancedejesus Jun 13, 2024
bd57ee7
updated Masquerading Attempts as Native Windows Binaries
terrancedejesus Jun 13, 2024
9c79ff1
updates Rare DLL Side-Loading by Occurrence
terrancedejesus Jun 13, 2024
c2de0bc
updates Rare LSASS Process Access Attempts
terrancedejesus Jun 13, 2024
9b127e6
update DNS Queries via LOLBins with Low Occurence Frequency
terrancedejesus Jun 14, 2024
e9dcd17
updated Low Occurrence of Drivers Loaded on Unique Hosts
terrancedejesus Jun 14, 2024
27adb80
updates Excessive RDP Network Activity by Host and User
terrancedejesus Jun 14, 2024
13427eb
updates Excessive SMB Network Activity by Process ID
terrancedejesus Jun 14, 2024
2d22d74
updated Executable File Creation by an Unusual Microsoft Binary
terrancedejesus Jun 14, 2024
db94b73
Frequency of Process Execution and Network Logon by Source Address
terrancedejesus Jun 14, 2024
d2a914c
updates Frequency of Process Execution and Network Logon by Source Ad…
terrancedejesus Jun 14, 2024
6b01bf9
updated Execution via Remote Services by Client Address
terrancedejesus Jun 14, 2024
f0d58a9
updated Startup Execution with Low Occurrence Frequency by Unique Host
terrancedejesus Jun 14, 2024
772fd03
updated Low Frequency of Process Execution via WMI by Unique Agent
terrancedejesus Jun 14, 2024
757d7ac
updated Low Frequency of Process Execution via Windows Scheduled Task…
terrancedejesus Jun 14, 2024
6e2d700
updated Low Occurence of Process Execution via Windows Services with …
terrancedejesus Jun 15, 2024
835c74d
Updated High Count of Network Connection Over Extended Period by Process
terrancedejesus Jun 15, 2024
9488d84
update Libraries Loaded by svchost with Low Occurrence Frequency
terrancedejesus Jun 15, 2024
1a2ecfb
updated Microsoft Office Child Processes with Low Occurrence Frequenc…
terrancedejesus Jun 15, 2024
7d2a559
updated Network Discovery via Sensitive Ports by Unusual Process
terrancedejesus Jun 15, 2024
e663cc6
updated PE File Transfer via SMB_Admin Shares by Agent or User
terrancedejesus Jun 15, 2024
342b667
updated Persistence via Run Key with Low Occurrence Frequency
terrancedejesus Jun 15, 2024
0856f3a
updates Persistence via Startup with Low Occurrence Frequency by Uniq…
terrancedejesus Jun 15, 2024
645439a
updates "Persistence via Run Key with Low Occurrence Frequency"; adju…
terrancedejesus Jun 15, 2024
c6089c6
updates "Low Occurrence of Suspicious Launch Agent or Launch Daemon"
terrancedejesus Jun 15, 2024
81269ff
updates "Egress Network Connections with Total Bytes Greater than Thr…
terrancedejesus Jun 15, 2024
3c46888
updates "Rundll32 Execution Aggregated by Command Line"
terrancedejesus Jun 15, 2024
60640c7
updates "Scheduled tasks Creation by Action via Registry"
terrancedejesus Jun 15, 2024
6d8985b
updates "Scheduled Tasks Creation for Unique Hosts by Task Command"
terrancedejesus Jun 15, 2024
593703b
updates "Suspicious Base64 Encoded Powershell Command"
terrancedejesus Jun 15, 2024
7bf1303
updates "Suspicious DNS TXT Record Lookups by Process"
terrancedejesus Jun 15, 2024
c7cabea
updates "Unique Windows Services Creation by Service File Name"
terrancedejesus Jun 15, 2024
c914897
Updates "Unique Windows Services Creation by Service File Name"
terrancedejesus Jun 15, 2024
d703522
updates "Windows Command and Scripting Interpreter from Unusual Paren…
terrancedejesus Jun 15, 2024
5fd1f42
updates "Windows Logon Activity by Source IP"
terrancedejesus Jun 15, 2024
699e405
updates "Suspicious Network Connections by Unsigned Mach-O"
terrancedejesus Jun 15, 2024
95a1662
updates LLM hunting queries
terrancedejesus Jun 15, 2024
587841a
re-generated markdown files; updated generate markdown py file
terrancedejesus Jun 15, 2024
75afe9a
updated test_hunt_data
terrancedejesus Jun 15, 2024
b888048
Update hunting/macos/queries/suspicious_network_connections_by_unsign…
terrancedejesus Jun 19, 2024
bee1def
Update hunting/windows/queries/drivers_load_with_low_occurrence_frequ…
terrancedejesus Jun 19, 2024
8a989ce
Update hunting/windows/queries/domain_names_queried_via_lolbins_and_w…
terrancedejesus Jun 19, 2024
a1c35ad
Update hunting/windows/queries/excessive_rdp_network_activity_by_sour…
terrancedejesus Jun 19, 2024
7651091
Update hunting/windows/queries/excessive_rdp_network_activity_by_sour…
terrancedejesus Jun 19, 2024
f9c8b48
updated missing integrations
terrancedejesus Jun 19, 2024
6fa0142
Merge branch 'main' into hunt-tuning-add-descriptions
terrancedejesus Jun 19, 2024
eabe3a4
updated MD docs according to recent hunting changes
terrancedejesus Jun 19, 2024
fad3136
Update hunting/windows/queries/executable_file_creation_by_an_unusual…
terrancedejesus Jun 20, 2024
8634fcd
Update hunting/windows/queries/detect_rare_dll_sideload_by_occurrence…
terrancedejesus Jun 20, 2024
0fc408b
Update hunting/windows/queries/detect_masquerading_attempts_as_native…
terrancedejesus Jun 20, 2024
3093465
Update hunting/windows/queries/detect_dll_hijack_via_masquerading_as_…
terrancedejesus Jun 20, 2024
ae7be2f
Update hunting/llm/queries/aws_bedrock_dos_resource_exhaustion_detect…
terrancedejesus Jun 20, 2024
2f7de2b
added enrichment policy link to rule
terrancedejesus Jun 20, 2024
073967d
Merge branch 'main' into hunt-tuning-add-descriptions
terrancedejesus Jun 20, 2024
50ea78f
Merge branch 'main' into hunt-tuning-add-descriptions
terrancedejesus Jun 21, 2024
3ab1b52
Merge branch 'main' into hunt-tuning-add-descriptions
terrancedejesus Jun 25, 2024
200114e
Update hunting/windows/docs/execution_via_windows_management_instrume…
terrancedejesus Jun 25, 2024
c356d25
Update hunting/windows/docs/windows_command_and_scripting_interpreter…
terrancedejesus Jun 25, 2024
c4d4b05
Update hunting/windows/docs/windows_command_and_scripting_interpreter…
terrancedejesus Jun 25, 2024
d27af65
Update hunting/windows/docs/rundll32_execution_aggregated_by_cmdline.md
terrancedejesus Jun 25, 2024
41f3281
Update hunting/windows/docs/microsoft_office_child_processes_with_low…
terrancedejesus Jun 25, 2024
36d9c44
Update hunting/windows/docs/microsoft_office_child_processes_with_low…
terrancedejesus Jun 25, 2024
746e776
Update hunting/windows/queries/execution_via_windows_management_instr…
terrancedejesus Jun 25, 2024
a07b73e
Update hunting/windows/queries/execution_via_windows_management_instr…
terrancedejesus Jun 25, 2024
98cf15c
Update hunting/index.md
terrancedejesus Jun 25, 2024
a445d83
Update hunting/windows/docs/execution_via_network_logon_by_occurrence…
terrancedejesus Jun 25, 2024
5a90375
Update hunting/windows/queries/execution_via_network_logon_by_occurre…
terrancedejesus Jun 25, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions hunting/generate_markdown.py
Original file line number Diff line number Diff line change
Expand Up @@ -28,12 +28,13 @@ class Hunt:
"""Dataclass to represent a hunt."""

author: str
description: str
integration: list[str]
uuid: str
name: str
language: str
license: str
query: str
query: list[str]
notes: Optional[List[str]] = field(default_factory=list)
mitre: Optional[List[str]] = field(default_factory=list)
references: Optional[List[str]] = field(default_factory=list)
Expand Down Expand Up @@ -81,11 +82,13 @@ def convert_toml_to_markdown(hunt_config: Hunt, file_path: Path) -> str:
markdown = f"# {hunt_config.name}\n\n---\n\n"
markdown += "## Metadata\n\n"
markdown += f"- **Author:** {hunt_config.author}\n"
markdown += f"- **Description:** {hunt_config.description}\n"
markdown += f"- **UUID:** `{hunt_config.uuid}`\n"
markdown += f"- **Integration:** {", ".join(generate_integration_links(hunt_config.integration))}\n"
markdown += f"- **Language:** `{hunt_config.language}`\n\n"
markdown += "## Query\n\n"
markdown += f"```sql\n{hunt_config.query}```\n\n"
for query in hunt_config.query:
markdown += f"```sql\n{query}```\n\n"

if hunt_config.notes:
markdown += "## Notes\n\n" + "\n".join(f"- {note}" for note in hunt_config.notes)
Expand Down
89 changes: 35 additions & 54 deletions hunting/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,65 +3,46 @@
Here are the queries currently available:

## llm
- [Denial of Service or Resource Exhaustion Attacks Detection](./llm/docs/llm_dos_resource_exhaustion_detection.md) (ES|QL)
- [Monitoring for Latency Anomalies](./llm/docs/llm_latency_anomalies_detection.md) (ES|QL)
- [Sensitive Content Refusal Detection](./llm/docs/llm_sensitive_content_refusal_detection.md) (ES|QL)
- [AWS Bedrock LLM Denial-of-Service or Resource Exhaustion](./llm/docs/aws_bedrock_dos_resource_exhaustion_detection.md) (ES|QL)
- [AWS Bedrock LLM Latency Anomalies](./llm/docs/aws_bedrock_latency_anomalies_detection.md) (ES|QL)
- [AWS Bedrock LLM Sensitive Content Refusals](./llm/docs/aws_bedrock_sensitive_content_refusal_detection.md) (ES|QL)


## macos
- [Suspicious Network Connections by Unsigned Mach-O](./macos/docs/suspicious_network_connections_by_unsigned_macho.md) (ES|QL)


## windows
- [CreateRemoteThread by source process with low occurrence](./windows/docs/createremotethread_by_source_process_with_low_occurrence.md) (ES|QL)
- [Detect DLL Hijack via Masquerading as Microsoft Native Libraries - Elastic Defend](./windows/docs/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries_elastic_defend.md) (ES|QL)
- [Detect DLL Hijack via Masquerading as Microsoft Native Libraries - Sysmon](./windows/docs/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries_sysmon.md) (ES|QL)
- [Detect masquerading attempts as native Windows binaries](./windows/docs/detect_masquerading_attempts_as_native_windows_binaries.md) (ES|QL)
- [Detect Rare DLL SideLoad by Occurrence - Elastic Defend](./windows/docs/detect_rare_dll_sideload_by_occurrence_elastic_defend.md) (ES|QL)
- [Detect Rare DLL SideLoad by Occurrence - Sysmon](./windows/docs/detect_rare_dll_sideload_by_occurrence_sysmon.md) (ES|QL)
- [Detect Rare LSASS Process Access Attempts - Elastic Defend](./windows/docs/detect_rare_lsass_process_access_attempts_elastic_defend.md) (ES|QL)
- [Detect Rare LSASS Process Access Attempts - Sysmon](./windows/docs/detect_rare_lsass_process_access_attempts_sysmon.md) (ES|QL)
- [Doamin Names queries via Lolbins and with low occurence frequency](./windows/docs/doamin_names_queries_via_lolbins_and_with_low_occurence_frequency.md) (ES|QL)
- [Drivers Load with low occurrence frequency - Elastic Defend](./windows/docs/drivers_load_with_low_occurrence_frequency_elastic_defend.md) (ES|QL)
- [Drivers Load with low occurrence frequency - Sysmon](./windows/docs/drivers_load_with_low_occurrence_frequency_sysmon.md) (ES|QL)
- [Drivers Load with low occurrence frequency - Windows 7045](./windows/docs/drivers_load_with_low_occurrence_frequency_windows_7045.md) (ES|QL)
- [Excessive RDP Network Activity by Source Host and User- Elastic Defend - Sysmon](./windows/docs/excessive_rdp_network_activity_by_source_host_and_user-_elastic_defend_sysmon.md) (ES|QL)
- [Excessive RDP Network Activity by Source Host - Elastic Defend - Sysmon](./windows/docs/excessive_rdp_network_activity_by_source_host_elastic_defend_sysmon.md) (ES|QL)
- [Excessive SMB Network Activity by process Id](./windows/docs/excessive_smb_network_activity_by_process_id.md) (ES|QL)
- [Executable File creation by an Unusual Microsoft Binary - Elastic Defend](./windows/docs/executable_file_creation_by_an_unusual_microsoft_binary_elastic_defend.md) (ES|QL)
- [Executable File creation by an Unusual Microsoft Binary - Sysmon](./windows/docs/executable_file_creation_by_an_unusual_microsoft_binary_sysmon.md) (ES|QL)
- [Execution via Network Logon by occurrence frequency](./windows/docs/execution_via_network_logon_by_occurrence_frequency.md) (ES|QL)
- [Execution via Network Logon by occurrence frequency by top Source IP](./windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md) (ES|QL)
- [Low Occurrence Rate of CreateRemoteThread by Source Process](./windows/docs/createremotethread_by_source_process_with_low_occurrence.md) (ES|QL)
- [DLL Hijack via Masquerading as Microsoft Native Libraries](./windows/docs/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries.md) (ES|QL)
- [Masquerading Attempts as Native Windows Binaries](./windows/docs/detect_masquerading_attempts_as_native_windows_binaries.md) (ES|QL)
- [Rare DLL Side-Loading by Occurrence](./windows/docs/detect_rare_dll_sideload_by_occurrence.md) (ES|QL)
- [Rare LSASS Process Access Attempts](./windows/docs/detect_rare_lsass_process_access_attempts.md) (ES|QL)
- [DNS Queries via LOLBins with Low Occurence Frequency](./windows/docs/domain_names_queried_via_lolbins_and_with_low_occurence_frequency.md) (ES|QL)
- [Low Occurrence of Drivers Loaded on Unique Hosts](./windows/docs/drivers_load_with_low_occurrence_frequency.md) (ES|QL)
- [Excessive RDP Network Activity by Host and User](./windows/docs/excessive_rdp_network_activity_by_source_host_and_user.md) (ES|QL)
- [Excessive SMB Network Activity by Process ID](./windows/docs/excessive_smb_network_activity_by_process_id.md) (ES|QL)
- [Executable File Creation by an Unusual Microsoft Binary](./windows/docs/executable_file_creation_by_an_unusual_microsoft_binary.md) (ES|QL)
- [Frequency of Process Execution and Network Logon by Source Address](./windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md) (ES|QL)
terrancedejesus marked this conversation as resolved.
Show resolved Hide resolved
- [Execution via Remote Services by Client Address](./windows/docs/execution_via_remote_services_by_client_address.md) (ES|QL)
- [Execution via Startup with low occurrence frequency](./windows/docs/execution_via_startup_with_low_occurrence_frequency.md) (ES|QL)
- [Execution via Windows Management Instrumentation by occurrence frequency by Unique Agent - Elastic Defend - Sysmon](./windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent_elastic_defend_sysmon.md) (ES|QL)
- [Execution via Windows Management Instrumentation by occurrence frequency - Elastic Defend - Sysmon](./windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_elastic_defend_sysmon.md) (ES|QL)
- [Execution via Windows Management Instrumentation by occurrence frequency - Elastic Defend - Sysmon - Windows Security](./windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_elastic_defend_sysmon_windows_security.md) (ES|QL)
- [Execution via Windows Scheduled Task with low occurrence frequency](./windows/docs/execution_via_windows_scheduled_task_with_low_occurrence_frequency.md) (ES|QL)
- [Execution via Windows Services with low occurrence frequency - Elastic Defend - Sysmon](./windows/docs/execution_via_windows_services_with_low_occurrence_frequency_elastic_defend_sysmon.md) (ES|QL)
- [Execution via Windows Services with low occurrence frequency - Windows Security](./windows/docs/execution_via_windows_services_with_low_occurrence_frequency_windows_security.md) (ES|QL)
- [High count of network connection over extended period by process - Elastic Defend Network](./windows/docs/high_count_of_network_connection_over_extended_period_by_process_elastic_defend_network.md) (ES|QL)
- [High count of network connection over extended period by process - Elastic Defend Network - Sysmon](./windows/docs/high_count_of_network_connection_over_extended_period_by_process_elastic_defend_network_sysmon.md) (ES|QL)
- [High count of network connection over extended period by process - Elastic Defend - Sysmon](./windows/docs/high_count_of_network_connection_over_extended_period_by_process_elastic_defend_sysmon.md) (ES|QL)
- [Libraries loaded by svchost with low occurrence frequency - Elastic Defend](./windows/docs/libraries_loaded_by_svchost_with_low_occurrence_frequency_elastic_defend.md) (ES|QL)
- [Libraries loaded by svchost with low occurrence frequency - Sysmon](./windows/docs/libraries_loaded_by_svchost_with_low_occurrence_frequency_sysmon.md) (ES|QL)
- [Microsoft Office Child Processes with low occurrence frequency](./windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md) (ES|QL)
- [Network Discovery via sensitive ports by unusual process](./windows/docs/network_discovery_via_sensitive_ports_by_unusual_process.md) (ES|QL)
- [PE File Transfer via SMB_Admin Shares by Agent](./windows/docs/pe_file_transfer_via_smb_admin_shares_by_agent.md) (ES|QL)
- [PE File Transfer via SMB_Admin Shares by User](./windows/docs/pe_file_transfer_via_smb_admin_shares_by_user.md) (ES|QL)
- [Persistence via Run Key with low occurrence frequency - Elastic Defend](./windows/docs/persistence_via_run_key_with_low_occurrence_frequency_elastic_defend.md) (ES|QL)
- [Persistence via Run Key with low occurrence frequency - Sysmon](./windows/docs/persistence_via_run_key_with_low_occurrence_frequency_sysmon.md) (ES|QL)
- [Persistence via Startup with low occurrence frequency](./windows/docs/persistence_via_startup_with_low_occurrence_frequency.md) (ES|QL)
- [Persistence via Suspicious Launch Agent or Launch Daemon with low occurrence](./windows/docs/persistence_via_suspicious_launch_agent_or_launch_daemon_with_low_occurrence.md) (ES|QL)
- [Potential Exfiltration by process total egress bytes](./windows/docs/potential_exfiltration_by_process_total_egress_bytes.md) (ES|QL)
- [Rundll32 execution aggregated by cmdline](./windows/docs/rundll32_execution_aggregated_by_cmdline.md) (ES|QL)
- [Scheduled tasks creation by action via registry](./windows/docs/scheduled_task_creation_by_action_via_registry.md) (ES|QL)
- [Scheduled tasks creation with low occurrence frequency](./windows/docs/scheduled_tasks_creation_with_low_occurrence_frequency.md) (ES|QL)
- [Suspicious Base64 Encoded PowerShell Command](./windows/docs/suspicious_base64_encoded_powershell_commands.md) (ES|QL)
- [Suspicious DNS TXT Record lookups by process](./windows/docs/suspicious_dns_txt_record_lookups_by_process.md) (ES|QL)
- [Unique Windows Services Creation by ServiceFileName - Elastic Defend Registry - Sysmon](./windows/docs/unique_windows_services_creation_by_servicefilename_elastic_defend_registry_sysmon.md) (ES|QL)
- [Unique Windows Services Creation by ServiceFileName - Elastic Defend - Sysmon Registry](./windows/docs/unique_windows_services_creation_by_servicefilename_elastic_defend_sysmon_registry.md) (ES|QL)
- [Unique Windows Services Creation by ServiceFileName - Windows Security 4697](./windows/docs/unique_windows_services_creation_by_servicefilename_windows_security_4697.md) (ES|QL)
- [Unique Windows Services Creation by ServiceFileName - Windows Security 7045](./windows/docs/unique_windows_services_creation_by_servicefilename_windows_security_7045.md) (ES|QL)
- [Windows Command and Scripting Interpreter from unusual parent](./windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md) (ES|QL)
- [Windows logon activity by source IP](./windows/docs/windows_logon_activity_by_source_ip.md) (ES|QL)
- [Startup Execution with Low Occurrence Frequency by Unique Host](./windows/docs/execution_via_startup_with_low_occurrence_frequency.md) (ES|QL)
- [Low Frequency of Process Execution via WMI by Unique Agent](./windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.md) (ES|QL)
- [Low Frequency of Process Execution via Windows Scheduled Task by Unique Agent](./windows/docs/execution_via_windows_scheduled_task_with_low_occurrence_frequency.md) (ES|QL)
- [Low Occurence of Process Execution via Windows Services with Unique Agent](./windows/docs/execution_via_windows_services_with_low_occurrence_frequency.md) (ES|QL)
- [High Count of Network Connection Over Extended Period by Process](./windows/docs/high_count_of_network_connection_over_extended_period_by_process.md) (ES|QL)
- [Libraries Loaded by svchost with Low Occurrence Frequency](./windows/docs/libraries_loaded_by_svchost_with_low_occurrence_frequency.md) (ES|QL)
- [Microsoft Office Child Processes with Low Occurrence Frequency by Unique Agent](./windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md) (ES|QL)
- [Network Discovery via Sensitive Ports by Unusual Process](./windows/docs/network_discovery_via_sensitive_ports_by_unusual_process.md) (ES|QL)
- [PE File Transfer via SMB_Admin Shares by Agent or User](./windows/docs/pe_file_transfer_via_smb_admin_shares_by_agent.md) (ES|QL)
- [Persistence via Run Key with Low Occurrence Frequency](./windows/docs/persistence_via_run_key_with_low_occurrence_frequency.md) (ES|QL)
- [Persistence via Startup with Low Occurrence Frequency by Unique Host](./windows/docs/persistence_via_startup_with_low_occurrence_frequency.md) (ES|QL)
- [Low Occurrence of Suspicious Launch Agent or Launch Daemon](./windows/docs/persistence_via_suspicious_launch_agent_or_launch_daemon_with_low_occurrence.md) (ES|QL)
- [Egress Network Connections with Total Bytes Greater than Threshold](./windows/docs/potential_exfiltration_by_process_total_egress_bytes.md) (ES|QL)
- [Rundll32 Execution Aggregated by Command Line](./windows/docs/rundll32_execution_aggregated_by_cmdline.md) (ES|QL)
- [Scheduled tasks Creation by Action via Registry](./windows/docs/scheduled_task_creation_by_action_via_registry.md) (ES|QL)
- [Scheduled Tasks Creation for Unique Hosts by Task Command](./windows/docs/scheduled_tasks_creation_for_unique_hosts_by_task_command.md) (ES|QL)
- [Suspicious Base64 Encoded Powershell Command](./windows/docs/suspicious_base64_encoded_powershell_commands.md) (ES|QL)
- [Suspicious DNS TXT Record Lookups by Process](./windows/docs/suspicious_dns_txt_record_lookups_by_process.md) (ES|QL)
- [Unique Windows Services Creation by Service File Name](./windows/docs/unique_windows_services_creation_by_servicefilename.md) (ES|QL)
- [Windows Command and Scripting Interpreter from Unusual Parent Process](./windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md) (ES|QL)
- [Windows Logon Activity by Source IP](./windows/docs/windows_logon_activity_by_source_ip.md) (ES|QL)
Original file line number Diff line number Diff line change
@@ -1,10 +1,12 @@
# Denial of Service or Resource Exhaustion Attacks Detection
# AWS Bedrock LLM Denial-of-Service or Resource Exhaustion

---

## Metadata

- **Author:** Elastic
- **Description:** This hunting query identifies unusual spikes in token usage that may indicate malicious attempts to disrupt services. High token usage can strain system resources and degrade performance, aligning with tactics observed in DoS attacks.

- **UUID:** `dc181967-c32c-46c9-b84b-ec4c8811c6a0`
- **Integration:** [aws_bedrock.invocation](https://docs.elastic.co/integrations/aws_bedrock)
- **Language:** `ES|QL`
Expand All @@ -29,7 +31,7 @@ from logs-aws_bedrock.invocation-*

## Notes

- This query identifies unusual spikes in token usage that may indicate malicious attempts to disrupt services. High token usage can strain system resources and degrade performance, aligning with tactics observed in DoS attacks.
-
- Consider reviewing the context of high token requests to differentiate between legitimate heavy usage and potential abuse. Monitor the source of requests and patterns over time for better assessment.
- Ensure logging and monitoring are correctly configured to capture detailed metrics on token usage. This will facilitate accurate detection and allow for a quick response to potential threats.
- Collect evidence from logs that detail the timestamp, user ID, session information, and token counts for incidents flagged by this analytic. This information will be crucial for forensic analysis in the event of a security incident.
Expand All @@ -40,7 +42,7 @@ from logs-aws_bedrock.invocation-*

- https://www.elastic.co/security-labs/elastic-advances-llm-security
- https://owasp.org/www-project-top-10-for-large-language-model-applications/
- [Denial of Service or Resource Exhaustion Attacks Detection](../queries/llm_dos_resource_exhaustion_detection.toml)
- [AWS Bedrock LLM Denial-of-Service or Resource Exhaustion](../queries/aws_bedrock_dos_resource_exhaustion_detection.toml)

## License

Expand Down
Original file line number Diff line number Diff line change
@@ -1,10 +1,12 @@
# Monitoring for Latency Anomalies
# AWS Bedrock LLM Latency Anomalies

---

## Metadata

- **Author:** Elastic
- **Description:** This analytic helps identify delays in LLM responses that are outside expected performance parameters, possibly due to malicious disruptions like DDoS attacks or from operational inefficiencies.

- **UUID:** `3708787b-811b-43b1-b2e7-c7276b8db48c`
- **Integration:** [aws_bedrock.invocation](https://docs.elastic.co/integrations/aws_bedrock)
- **Language:** `ES|QL`
Expand All @@ -24,7 +26,6 @@ from logs-aws_bedrock.invocation-*

## Notes

- This analytic helps identify delays in LLM responses that are outside expected performance parameters, possibly due to malicious disruptions like DDoS attacks or from operational inefficiencies.
- Review the incidents flagged by this analytic to understand the context and potential sources of latency. This can include network configurations, resource allocation, or external network pressures.
- Effective logging and monitoring setup are essential to capture relevant latency metrics accurately. Ensure system clocks and time syncing are properly configured to avoid false positives.
- Gather comprehensive logs that detail the request and response timestamps, user IDs, and session details for thorough investigation and evidence collection in case of security incidents.
Expand All @@ -35,7 +36,7 @@ from logs-aws_bedrock.invocation-*

- https://www.elastic.co/security-labs/elastic-advances-llm-security
- https://owasp.org/www-project-top-10-for-large-language-model-applications/
- [Monitoring for Latency Anomalies](../queries/llm_latency_anomalies_detection.toml)
- [AWS Bedrock LLM Latency Anomalies](../queries/aws_bedrock_latency_anomalies_detection.toml)

## License

Expand Down
Loading
Loading