heroui logo

Threat Intel Filebeat Module (v7.x) Indicator Match

Elastic Detection Rules

View Source
Summary
The 'Threat Intel Filebeat Module (v7.x) Indicator Match' rule is designed to detect potential threats by matching indicators from the Threat Intel Filebeat module against local observations, including file hashes, IP addresses, URLs, and registry paths. This detection relies on data collected from a variety of sources, such as auditbeat, endgame, and filebeat modules, over the past 30 days. When a match occurs, it generates enriched fields that provide context about the matched indicator, enhancing visibility into potentially malicious activity. The rule emphasizes the importance of validating the incoming data and conducting thorough investigations to differentiate between legitimate behavior and potential threats, taking into account the history and role of the users involved. False positive analysis highlights that innocent behaviors can trigger false alerts due to legitimate tools being flagged as threats, necessitating a careful review of the context. Immediate response is crucial when suspicious behavior is detected, including isolating affected systems and preventing further actions associated with confirmed threats.
Categories
  • Network
  • Endpoint
  • Cloud
  • Windows
  • Linux
Data Sources
  • File
  • Network Traffic
  • Process
  • Image
  • User Account
Created: 2021-04-21