
Summary
The exploit detection rule named 'Exploit - Detected - Elastic Endgame' is designed to identify exploit attempts within the monitored environment using data generated from Elastic Endgame. This detection rule looks for specific events generated by the Endgame module, particularly those related to exploit events. It captures instances where an adversary may attempt to exploit a vulnerability for malicious purposes such as executing unauthorized code or privilege escalation. The rule utilizes a KQL (Kibana Query Language) query that focuses on alert events related to exploit attempts, as indicated by the 'event.kind' and 'event.module' fields. Alerts triggered by this rule are prioritized based on a risk score of 73, making them of high significance. The rule's structure allows for a maximum of 10,000 alerts per run, enabling comprehensive threat detection while maintaining efficiency. A detailed investigation and response guide accompanies the rule, outlining methods for handling potential false positives and remediation steps for confirmed exploit attempts, incorporating MITRE ATT&CK tactics and techniques relevant to the identified threats.
Categories
- Endpoint
- Cloud
- Infrastructure
- On-Premise
Data Sources
- Pod
- Container
- User Account
- Script
- Logon Session
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1068
Created: 2020-02-18