Skip to content

Conversation

@Samirbous
Copy link
Contributor

  • Bash Shell Profile Modification - remove rename from event.action and uses file.name for better matches).
  • Web Shell Detection: Script Process Child of Common Web Processes - extra tuning to reduce FPs

@Samirbous Samirbous self-assigned this Dec 17, 2025
@Samirbous Samirbous added the Rule: Tuning tweaking or tuning an existing rule label Dec 17, 2025
@botelastic botelastic bot added Domain: Endpoint OS: Windows windows related rules labels Dec 17, 2025
@Samirbous Samirbous requested a review from w0rk3r December 17, 2025 10:40
@github-actions
Copy link
Contributor

Rule: Tuning - Guidelines

These guidelines serve as a reminder set of considerations when tuning an existing rule.

Documentation and Context

  • Detailed description of the suggested changes.
  • Provide example JSON data or screenshots.
  • Provide evidence of reducing benign events mistakenly identified as threats (False Positives).
  • Provide evidence of enhancing detection of true threats that were previously missed (False Negatives).
  • Provide evidence of optimizing resource consumption and execution time of detection rules (Performance).
  • Provide evidence of specific environment factors influencing customized rule tuning (Contextual Tuning).
  • Provide evidence of improvements made by modifying sensitivity by changing alert triggering thresholds (Threshold Adjustments).
  • Provide evidence of refining rules to better detect deviations from typical behavior (Behavioral Tuning).
  • Provide evidence of improvements of adjusting rules based on time-based patterns (Temporal Tuning).
  • Provide reasoning of adjusting priority or severity levels of alerts (Severity Tuning).
  • Provide evidence of improving quality integrity of our data used by detection rules (Data Quality).
  • Ensure the tuning includes necessary updates to the release documentation and versioning.

Rule Metadata Checks

  • updated_date matches the date of tuning PR merged.
  • min_stack_version should support the widest stack versions.
  • name and description should be descriptive and not include typos.
  • query should be inclusive, not overly exclusive. Review to ensure the original intent of the rule is maintained.

Testing and Validation

  • Validate that the tuned rule's performance is satisfactory and does not negatively impact the stack.
  • Ensure that the tuned rule has a low false positive rate.

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@botelastic botelastic bot added the OS: Linux label Dec 17, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

severity = "high"
tags = [
"OS: Windows",
"Data Source: Elastic Endgame",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

severity = "low"
tags = [
"OS: Windows",
"Data Source: Elastic Endgame",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Internal Linux SSH Brute Force Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 17, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Internal Linux SSH Brute Force Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Dec 18, 2025

⛔️ Test failed

Results
  • ❌ Uncommon Destination Port Connection by Web Server (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Execution via XZBackdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Bash Shell Profile Modification (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@Samirbous Samirbous merged commit b996a29 into main Dec 18, 2025
14 checks passed
@Samirbous Samirbous deleted the trade_genai_critical_high_rules branch December 18, 2025 15:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport: auto Domain: Endpoint OS: Linux OS: Windows windows related rules Rule: Tuning tweaking or tuning an existing rule

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants