Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[New Hunt] Persistence via Initramfs #4402

Merged
merged 4 commits into from
Jan 27, 2025
Merged

Conversation

Aegrah
Copy link
Contributor

@Aegrah Aegrah commented Jan 21, 2025

Summary

This PR adds several new hunts related to Initramfs persistence.

1

{A641F792-546C-4C6A-AC1B-A63EB4EACB2F}

2

{A6D790F9-7548-44BC-8E2E-E57DCDB43008}

Copy link
Contributor

Hunt: New - Guidelines

Welcome to the hunting folder within the detection-rules repository! This directory houses a curated collection of threat hunting queries designed to enhance security monitoring and threat detection capabilities using the Elastic Stack.

Documentation and Context

  • Detailed description of the Hunt.
  • Link related issues or PRs.
  • Include references.
  • Field Usage: Ensure standardized fields for compatibility across different data environments and sources.

Hunt Metadata Checks

  • author: The name of the individual or organization authoring the rule.
  • uuid: Unique UUID.
  • name and description are descriptive and typo-free.
  • language: The query language(s) used in the rule, such as KQL, EQL, ES|QL, OsQuery, or YARA.
  • query is inclusive, not overly exclusive, considering performance for diverse environments.
  • integration aligns with the index. Ensure updates if the integration is newly introduced.
  • notes includes additional information regarding data collected from the hunting query.
  • mitre matches appropriate technique and sub-technique IDs that hunting query collect's data for.
  • references are valid URL links that include information relevenat to the hunt or threat.
  • license

Testing and Validation

  • Evidence of testing and valid query usage.
  • Markdown Generated: Run python -m hunting generate-markdown with specific parameters to ensure a markdown version of the hunting TOML files is created.
  • Index Refreshed: Run python -m hunting refresh-index to refresh indexes.
  • Run Unit Tests: Run pytest tests/test_hunt_data.py to run unit tests.

@shashank-elastic
Copy link
Contributor

shashank-elastic commented Jan 24, 2025

@Aegrah How do u feel about merging all hunt into one PR. this will also help updating patch version in one go , else this would be one patch for each hunt!

Synced on the context!

@Aegrah Aegrah added the patch label Jan 24, 2025
@Aegrah Aegrah merged commit bbcf0c7 into main Jan 27, 2025
9 checks passed
@Aegrah Aegrah deleted the initramfs-persistence-hunting branch January 27, 2025 09:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants