heroui logo

Multiple Alerts in Same ATT&CK Tactic by Host

Elastic Detection Rules

View Source
Summary
This rule, named 'Multiple Alerts in Same ATT&CK Tactic by Host', is designed to enhance the detection of potential security incidents by correlating multiple security alerts that are linked to the same MITRE ATT&CK tactic occurring on a single host within a specified time frame. It focuses on identifying behaviors that indicate concentrated malicious activities, which may suggest an ongoing intrusion or post-compromise activity. Rather than responding to individual alerts, the rule aggregates alerts from various detection methods, thus allowing security analysts to prioritize their triage efforts based on hosts that exhibit a higher likelihood of compromise. The query strictly filters for alerts tagging the tactics of 'Credential Access', 'Defense Evasion', 'Execution', and 'Command and Control', while specifically excluding machine learning-based alerts and those that tend to produce noise. The aim is to ensure that only significant, correlated alerts are examined to filter out false positives and concentrate on genuine threats. Once alerts are aggregated, analysis can proceed to identify risky patterns and take appropriate investigation steps to safeguard the environment.
Categories
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • User Account
  • Process
  • Network Traffic
Created: 2026-01-12