Example response for a query rule
{
"id": "6541b99a-dee9-4f6d-a86d-dbd1869d73b1",
"to": "now",
"from": "now-70m",
"name": "MS Office child process",
"tags": [
"child process",
"ms office"
],
"type": "query",
"query": "process.parent.name:EXCEL.EXE or process.parent.name:MSPUB.EXE or process.parent.name:OUTLOOK.EXE or process.parent.name:POWERPNT.EXE or process.parent.name:VISIO.EXE or process.parent.name:WINWORD.EXE",
"setup": "",
"threat": [],
"actions": [],
"enabled": false,
"filters": [
{
"query": {
"match": {
"event.action": {
"type": "phrase",
"query": "Process Create (rule: ProcessCreate)"
}
}
}
}
],
"rule_id": "process_started_by_ms_office_program",
"version": 1,
"interval": "1h",
"language": "kuery",
"severity": "low",
"immutable": false,
"created_at": "2020-04-07T14:51:09.755Z",
"created_by": "elastic",
"references": [],
"risk_score": 50,
"updated_at": "2020-04-07T14:51:09.970Z",
"updated_by": "elastic",
"description": "Process started by MS Office program - possible payload",
"max_signals": 100,
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "process.parent.name",
"type": "keyword"
}
],
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
},
{
"package": "azure",
"version": "^1.11.4",
"integration": "graphactivitylogs"
}
]
}
Example response for a machine learning job rule
{
"id": "83876f66-3a57-4a99-bf37-416494c80f3b",
"to": "now",
"from": "now-6m",
"name": "Anomalous Linux network activity",
"note": "Shut down the internet.",
"tags": [
"machine learning",
"Linux"
],
"type": "machine_learning",
"setup": "",
"status": "going to run",
"threat": [],
"actions": [
{
"id": "5ad22cd5-5e6e-4c6c-a81a-54b626a4cec5",
"group": "default",
"params": {
"message": "Urgent: {{context.rule.description}}"
},
"frequency": {
"summary": true,
"throttle": null,
"notifyWhen": "onActiveAlert"
},
"action_type_id": ".slack"
}
],
"enabled": true,
"rule_id": "ml_linux_network_high_threshold",
"version": 1,
"interval": "5m",
"severity": "high",
"immutable": false,
"created_at": "2020-04-07T14:45:15.679Z",
"created_by": "elastic",
"references": [],
"risk_score": 70,
"updated_at": "2020-04-07T14:45:15.892Z",
"updated_by": "elastic",
"description": "Generates alerts when the job discovers anomalies over 70",
"max_signals": 100,
"status_date": "2020-04-07T14:45:21.685Z",
"false_positives": [],
"required_fields": [],
"anomaly_threshold": 70,
"related_integrations": [],
"machine_learning_job_id": "linux_anomalous_network_activity_ecs"
}
Example response for a threshold rule
{
"id": "15dbde26-b627-4d74-bb1f-a5e0ed9e4993",
"to": "now",
"from": "now-180s",
"name": "Windows server prml-19",
"tags": [
"Brute force"
],
"type": "threshold",
"index": [
"winlogbeat-*"
],
"query": "host.name:prml-19 and event.category:authentication and event.outcome:failure",
"setup": "",
"author": [],
"threat": [],
"actions": [],
"enabled": true,
"rule_id": "liv-win-ser-logins",
"version": 1,
"interval": "2m",
"language": "kuery",
"severity": "low",
"immutable": false,
"threshold": {
"field": "source.ip",
"value": 20
},
"created_at": "2020-07-22T10:27:23.486Z",
"created_by": "elastic",
"references": [],
"risk_score": 30,
"updated_at": "2020-07-22T10:27:23.673Z",
"updated_by": "elastic",
"description": "Detects when there are 20 or more failed login attempts from the same IP address with a 2 minute time frame.",
"max_signals": 100,
"exceptions_list": [
{
"id": "int-ips",
"type": "detection",
"namespace_type": "single"
}
],
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "source.ip",
"type": "ip"
}
],
"severity_mapping": [
{
"field": "source.geo.city_name",
"value": "Manchester",
"operator": "equals",
"severity": "low"
},
{
"field": "source.geo.city_name",
"value": "London",
"operator": "equals",
"severity": "medium"
},
{
"field": "source.geo.city_name",
"value": "Birmingham",
"operator": "equals",
"severity": "high"
},
{
"field": "source.geo.city_name",
"value": "Wallingford",
"operator": "equals",
"severity": "critical"
}
],
"risk_score_mapping": [],
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
}
]
}
Example response for an EQL rule
{
"id": "93808cae-b05b-4dc9-8479-73574b50f8b1",
"to": "now",
"from": "now-6m",
"name": "rundll32.exe network connection",
"tags": [
"EQL",
"Windows",
"rundll32.exe"
],
"type": "eql",
"query": "sequence by process.entity_id with maxspan=2h [process where event.type in (\"start\", \"process_started\") and (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\") and ((process.args == \"rundll32.exe\" and process.args_count == 1) or (process.args != \"rundll32.exe\" and process.args_count == 0))] [network where event.type == \"connection\" and (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\")]",
"setup": "",
"author": [],
"threat": [],
"enabled": true,
"rule_id": "eql-outbound-rundll32-connections",
"version": 1,
"interval": "5m",
"language": "eql",
"severity": "low",
"throttle": "no_actions",
"immutable": false,
"created_at": "2020-10-05T09:06:16.392Z",
"created_by": "elastic",
"references": [],
"risk_score": 21,
"updated_at": "2020-10-05T09:06:16.403Z",
"updated_by": "elastic",
"description": "Unusual rundll32.exe network connection",
"max_signals": 100,
"exceptions_list": [],
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "event.type",
"type": "keyword"
},
{
"ecs": true,
"name": "process.args",
"type": "keyword"
},
{
"ecs": true,
"name": "process.args_count",
"type": "long"
},
{
"ecs": true,
"name": "process.entity_id",
"type": "keyword"
},
{
"ecs": true,
"name": "process.name",
"type": "keyword"
},
{
"ecs": true,
"name": "process.pe.original_file_name",
"type": "keyword"
}
],
"severity_mapping": [],
"risk_score_mapping": [],
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
}
]
}
Example response for an indicator match rule
{
"id": "d5daa13f-81fb-4b13-be2f-31011e1d9ae1",
"to": "now",
"from": "now-6m",
"name": "Bad IP threat match",
"tags": [],
"type": "threat_match",
"index": [
"packetbeat-*"
],
"query": "destination.ip:* or host.ip:*",
"setup": "",
"author": [],
"threat": [],
"enabled": true,
"rule_id": "608501e4-c768-4f64-9326-cec55b5d439b",
"version": 1,
"interval": "5m",
"language": "kuery",
"severity": "medium",
"immutable": false,
"created_at": "2020-10-06T07:07:58.227Z",
"created_by": "elastic",
"references": [],
"risk_score": 50,
"updated_at": "2020-10-06T07:07:58.237Z",
"updated_by": "elastic",
"description": "Checks for bad IP addresses listed in the ip-threat-list index",
"max_signals": 100,
"threat_index": [
"ip-threat-list"
],
"threat_query": "*:*",
"threat_mapping": [
{
"entries": [
{
"type": "mapping",
"field": "destination.ip",
"value": "destination.ip"
},
{
"type": "mapping",
"field": "destination.port",
"value": "destination.port"
}
]
},
{
"entries": [
{
"type": "mapping",
"field": "source.ip",
"value": "host.ip"
}
]
}
],
"exceptions_list": [],
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "destination.ip",
"type": "ip"
},
{
"ecs": true,
"name": "destination.port",
"type": "long"
},
{
"ecs": true,
"name": "host.ip",
"type": "ip"
}
],
"severity_mapping": [],
"risk_score_mapping": [],
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
}
]
}
Example response for a new terms rule
{
"id": "eb7225c0-566b-11ee-8b4f-bbf3afdeb9f4",
"to": "now",
"from": "now-6m",
"name": "New User IP Detected",
"tags": [],
"type": "new_terms",
"index": [
"auditbeat*"
],
"query": "*",
"setup": "",
"author": [],
"threat": [],
"enabled": true,
"rule_id": "c6f5d0bc-7be9-47d4-b2f3-073d22641e30",
"version": 1,
"interval": "5m",
"language": "kuery",
"severity": "medium",
"immutable": false,
"created_at": "2020-10-06T07:07:58.227Z",
"created_by": "elastic",
"references": [],
"risk_score": 21,
"updated_at": "2020-10-06T07:07:58.237Z",
"updated_by": "elastic",
"description": "Detects a user associated with a new IP address",
"max_signals": 100,
"exceptions_list": [],
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "user.id",
"type": "keyword"
},
{
"ecs": true,
"name": "source.ip",
"type": "ip"
}
],
"new_terms_fields": [
"user.id",
"source.ip"
],
"severity_mapping": [],
"risk_score_mapping": [],
"history_window_start": "now-30d",
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
}
]
}
Example response for an Esql rule
{
"id": "d0f20490-6da4-11ee-b85e-09e9b661f2e2",
"to": "now",
"from": "now-360s",
"name": "Find Excel events",
"tags": [],
"type": "esql",
"query": "from auditbeat-8.10.2 METADATA _id | where process.parent.name == \"EXCEL.EXE\"",
"setup": "",
"author": [],
"threat": [],
"actions": [],
"enabled": false,
"rule_id": "e4b53a89-debd-4a0d-a3e3-20606952e589",
"version": 1,
"interval": "5m",
"language": "esql",
"revision": 0,
"severity": "low",
"immutable": false,
"created_at": "2023-10-18T10:55:14.269Z",
"created_by": "elastic",
"references": [],
"risk_score": 21,
"updated_at": "2023-10-18T10:55:14.269Z",
"updated_by": "elastic",
"description": "Find Excel events",
"max_signals": 100,
"output_index": "",
"exceptions_list": [],
"false_positives": [],
"required_fields": [
{
"ecs": true,
"name": "process.parent.name",
"type": "keyword"
}
],
"severity_mapping": [],
"risk_score_mapping": [],
"related_integrations": [
{
"package": "o365",
"version": "^2.3.2"
}
]
}