This documentation contains work-in-progress information for future Elastic Stack and Cloud releases. Use the version selector to view supported release docs. It also contains some Elastic Cloud serverless information. Check out our serverless docs for more details.
Multiple Alerts in Different ATT&CK Tactics on a Single Host
editMultiple Alerts in Different ATT&CK Tactics on a Single Host
editThis rule uses alert data to determine when multiple alerts in different phases of an attack involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.
Rule type: threshold
Rule indices:
- .alerts-*
Severity: high
Risk score: 73
Runs every: 1 hour
Searches indices from: now-24h (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
Tags:
- Elastic
- Threat Detection
- Higher-Order Rules
Version: 1
Added (Elastic Stack release): 8.6.0
Rule authors: Elastic
Rule license: Elastic License v2
Potential false positives
editFalse positives can occur because the rules may be mapped to a few MITRE ATT&CK tactics. Use the attached Timeline to determine which detections were triggered on the host.
Rule query
editsignal.rule.name:* and kibana.alert.rule.threat.tactic.id:*