Multiple Alerts in Different ATT&CK Tactics on a Single Host

edit

Multiple Alerts in Different ATT&CK Tactics on a Single Host

edit

This rule uses alert data to determine when multiple alerts in different phases of an attack involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.

Rule type: threshold

Rule indices:

  • .alerts-*

Severity: high

Risk score: 73

Runs every: 1 hour

Searches indices from: now-24h (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

Tags:

  • Elastic
  • Threat Detection
  • Higher-Order Rules

Version: 1

Added (Elastic Stack release): 8.6.0

Rule authors: Elastic

Rule license: Elastic License v2

Potential false positives

edit

False positives can occur because the rules may be mapped to a few MITRE ATT&CK tactics. Use the attached Timeline to determine which detections were triggered on the host.

Rule query

edit
signal.rule.name:* and kibana.alert.rule.threat.tactic.id:*