-
Notifications
You must be signed in to change notification settings - Fork 611
[New Rules] Add MITRE ATLAS framework support and GenAI threat detection rules #5352
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
⛔️ Test failed Results
|
Enhancement - GuidelinesThese guidelines serve as a reminder set of considerations when addressing adding a feature to the code. Documentation and Context
Code Standards and Practices
Testing
Additional Checks
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
| [[rule.threat]] | ||
| framework = "MITRE ATLAS" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still need to test importing ndjson to Kibana
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can import / export these rules with the proper mappings, editing the MITRE fields will remove the ATLAS mappings.
rules/cross-platform/collection_genai_process_sensitive_file_access.toml
Outdated
Show resolved
Hide resolved
…ccess.toml Co-authored-by: Samirbous <[email protected]>
|
⛔️ Test failed Results
|
Pull Request
Issue link(s): Related https://github.com/elastic/security-team/issues/9809
Summary - What I changed
This PR adds MITRE ATLAS framework support to the detection-rules repository and introduces five new Generative AI (GenAI) threat detection rules that leverage ATLAS techniques.
Framework Support
atlas.pymodule with utilities to load and process ATLAS data from the official MITRE ATLAS YAML filerule.pyto accept "MITRE ATLAS" as a valid threat framework alongside "MITRE ATT&CK"New Detection Rules
Five new cross-platform detection rules targeting GenAI-related threats:
Collection - GenAI Process Accessing Sensitive Files (
collection_genai_process_sensitive_file_access.toml)Command and Control - GenAI Process Connection to Suspicious TLD (
command_and_control_genai_process_suspicious_tld_connection.toml)Execution - GenAI Process Compiling Executables (
execution_genai_process_compiling_executables.toml)Execution - MCP Server Spawning Any Child Process (
execution_mcp_server_any_child_process.toml)Exfiltration - GenAI Process Encoding Prior to Network Activity (
exfiltration_genai_process_encoding_prior_to_network_activity.toml)All rules are cross-platform (Windows, macOS, Linux), use EQL queries, and include comprehensive investigation guides and false positive analysis.
How To Test
🔱 Tests will run in CI
Manual Testing
Validate ATLAS framework support:
python -m detection_rules testVerify rule validation:
Check ATLAS data loading:
Expected Test Results
Checklist
Rule: Newandenhancement(for ATLAS framework support)meta:rapid-mergelabel if planning to merge within 24 hours