detection-rules icon indicating copy to clipboard operation
detection-rules copied to clipboard

Results 231 detection-rules issues
Sort by recently updated
recently updated
newest added

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts that use string reordering and runtime reconstruction techniques as a form of obfuscation. These methods are designed to evade static...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts that use string concatenation as a form of obfuscation. These methods are designed to evade static analysis and bypass security...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts that use character arrays and runtime string reconstruction as a form of obfuscation. This technique breaks strings into individual characters,...

Rule: Tuning
OS: Windows
Domain: Endpoint
backport: auto

# Pull Request *Issue link(s)*: Resolves https://github.com/elastic/detection-rules/issues/4566 ## Summary - What I changed This PR fixes a bug where there was a missing default value if there where no new_terms...

bug
python
backport: auto
patch

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts with an abnormally high proportion of non-alphanumeric characters, often resulting from encoding, string mangling, or dynamic code generation. High volume...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto
bbr

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts that use backtick-escaped characters inside ${} variable expansion as a form of obfuscation. These methods are designed to evade static...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts with a disproportionately high number of numeric characters, often indicating the presence of obfuscated or encoded payloads. This behavior is...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts with an unusually high proportion of whitespace and special characters, often indicative of obfuscation. This behavior is commonly associated with...

Rule: New
OS: Windows
Domain: Endpoint
backport: auto

# Pull Request *Issue link(s)*: * https://github.com/elastic/ia-trade-team/issues/585 ## Summary - What I changed Adds detection coverage for `AWS STS Temporary IAM Session Token Used from Multiple Addresses`. Identified via ByBit/SafeWallet...

Integration: AWS
Domain: Cloud
Rule: New
backport: auto

## Issues Part of https://github.com/elastic/ia-trade-team/issues/533 ## Summary Identifies PowerShell scripts that reconstruct the IEX (Invoke-Expression) command at runtime using indexed slices of environment variables. This technique leverages character access and...

Rule: Tuning
OS: Windows
Domain: Endpoint
backport: auto