Top Related Projects
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Splunk Security Content
Cyber Threat Intelligence Repository expressed in STIX 2.0
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Main Sigma Rule Repository
Quick Overview
The elastic/protections-artifacts repository is a collection of detection rules, machine learning jobs, and other security content for Elastic Security. It provides a centralized location for security analysts and researchers to access and contribute to Elastic's security detection capabilities, enhancing threat detection and response across Elastic deployments.
Pros
- Comprehensive set of detection rules and machine learning jobs
- Community-driven contributions and updates
- Regularly maintained and updated by Elastic and the community
- Integrates seamlessly with Elastic Security products
Cons
- Requires an Elastic Stack deployment to utilize effectively
- Some advanced features may require paid Elastic subscriptions
- Learning curve for users unfamiliar with Elastic Security ecosystem
- Limited standalone functionality outside of Elastic environment
Code Examples
This repository primarily contains YAML configuration files for detection rules and machine learning jobs, rather than executable code. However, here are a few examples of how the content might be used:
- Importing a detection rule:
name: Potential DLL Side-Loading via Microsoft Antimalware Service Executable
type: eql
risk_score: 47
description: Detects potential DLL side-loading attempts using the Microsoft Antimalware Service Executable
query: |
process where event.type == "start" and
process.name : "MsMpEng.exe" and
not process.executable : ("C:\\Program Files\\Windows Defender\\*", "C:\\ProgramData\\Microsoft\\Windows Defender\\*")
- Configuring a machine learning job:
job_type: anomaly_detector
description: "Detect unusual process relationships"
groups: ["process"]
analysis_config:
bucket_span: 15m
detectors:
- function: rare
by_field_name: "process.parent.name"
over_field_name: "process.name"
- Using a threat intelligence indicator:
name: Known Malicious IP
type: threat_match
threat:
framework: MITRE ATT&CK
tactic:
name: Command and Control
id: TA0011
technique:
name: Application Layer Protocol
id: T1071
indicator:
type: ip
ip: 192.0.2.1
Getting Started
To use the protections-artifacts:
-
Clone the repository:
git clone https://github.com/elastic/protections-artifacts.git
-
Navigate to the desired content (e.g., detection rules, machine learning jobs).
-
Import the YAML files into your Elastic Security deployment using Elastic's documentation and tools.
-
Monitor and tune the imported content as needed for your environment.
Competitor Comparisons
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Pros of Azure-Sentinel
- More comprehensive security solution, integrating with broader Azure ecosystem
- Larger community and more frequent updates
- Advanced analytics and machine learning capabilities for threat detection
Cons of Azure-Sentinel
- Steeper learning curve due to complexity
- Higher cost, especially for large-scale deployments
- Tighter integration with Microsoft products may limit flexibility
Code Comparison
Azure-Sentinel (KQL query):
SecurityEvent
| where EventID == 4624
| where AccountType == "User"
| summarize count() by Account
Protections-artifacts (YAML rule):
rule:
name: Suspicious User Login Activity
type: threshold
index: winlogbeat-*
threshold:
field: user.name
value: 10
Both repositories provide security-related artifacts, but Azure-Sentinel offers a more comprehensive SIEM solution, while Protections-artifacts focuses on detection rules for Elastic Security. Azure-Sentinel uses KQL for queries and analytics, whereas Protections-artifacts primarily uses YAML for rule definitions. Azure-Sentinel is better suited for large enterprises deeply invested in the Microsoft ecosystem, while Protections-artifacts may be more appropriate for organizations using Elastic Stack for security monitoring.
Splunk Security Content
Pros of security_content
- More comprehensive content, covering a wider range of security use cases
- Better documentation and examples for each detection rule
- Active community contributions and regular updates
Cons of security_content
- Primarily focused on Splunk-specific implementations
- May require more customization for non-Splunk environments
- Larger repository size, potentially making it harder to navigate
Code Comparison
security_content (YAML format):
name: Suspicious PowerShell Script with Encoding
id: 3d6d3ff3-871c-4c6d-8bda-2d7c89b62b04
description: Detects suspicious PowerShell scripts using encoding techniques
search: |
index=windows sourcetype=WinEventLog:Microsoft-Windows-PowerShell/Operational EventCode=4104
(EncodedCommand=* OR Base64Encoded=*)
protections-artifacts (TOML format):
[rule.suspicious_powershell_encoding]
name = "Suspicious PowerShell Encoding"
type = "query"
index = "winlogbeat-*"
language = "kuery"
risk_score = 50
query = '''
process.name:powershell.exe AND process.args:(*encodedcommand* OR *enc*)
'''
Both repositories provide valuable security content, with security_content offering a broader scope and more detailed documentation, while protections-artifacts focuses on Elastic-specific implementations with a more concise structure.
Cyber Threat Intelligence Repository expressed in STIX 2.0
Pros of cti
- Comprehensive MITRE ATT&CK framework data in STIX format
- Regular updates with new threat intelligence
- Widely adopted and used in the cybersecurity community
Cons of cti
- Requires STIX/TAXII knowledge for effective use
- May contain more general threat data, less focused on specific detections
Code comparison
cti (STIX 2.1 JSON):
{
"type": "attack-pattern",
"id": "attack-pattern--01a5a209-b94c-450b-b7f9-946497d91055",
"created": "2020-05-12T18:33:51.152Z",
"modified": "2020-05-12T18:33:51.152Z",
"name": "Exploitation for Privilege Escalation"
}
protections-artifacts (YAML):
- rule:
name: Potential Privilege Escalation via Vulnerable Service
type: eql
risk_score: 73
severity: high
query: >
process where event.type == "start" and
process.name : ("sc.exe", "net.exe", "net1.exe") and
process.args : ("config", "start") and
process.args : ("binPath", "binpath", "bin_path")
The cti repository focuses on providing structured threat intelligence data, while protections-artifacts offers specific detection rules and logic for security products.
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Pros of ThreatHunter-Playbook
- Comprehensive threat hunting methodology with detailed playbooks
- Community-driven project with regular contributions and updates
- Includes analytics for multiple data sources and platforms
Cons of ThreatHunter-Playbook
- Less focused on specific product integration compared to protections-artifacts
- May require more manual effort to implement and customize
Code Comparison
ThreatHunter-Playbook (YAML):
title: Suspicious PowerShell Download Cradle
id: 1
description: Detects suspicious PowerShell download cradles
author: Open Threat Research
detection:
selection:
EventID: 4104
ScriptBlockText|contains:
- 'Net.WebClient'
- 'DownloadString'
condition: selection
protections-artifacts (YAML):
name: Suspicious PowerShell Download
rule_id: 7f8c6d3e-6f6d-41f1-9c9d-8e5b3e8c8c8c
type: eql
risk_score: 73
description: Detects suspicious PowerShell download activity
query: |
process where process.name : "powershell.exe" and
process.args : ("*Net.WebClient*", "*DownloadString*")
Both repositories provide valuable resources for threat detection and hunting. ThreatHunter-Playbook offers a more comprehensive approach with detailed playbooks, while protections-artifacts is more focused on Elastic-specific implementations. The code comparison shows similar detection logic for suspicious PowerShell downloads, but with different syntax and structure tailored to their respective purposes.
Main Sigma Rule Repository
Pros of Sigma
- Broader community support and contributions
- Platform-agnostic rule format, allowing for wider compatibility
- Extensive documentation and examples for rule creation
Cons of Sigma
- May require additional conversion tools for specific platforms
- Less tightly integrated with a specific product ecosystem
- Potentially slower update cycle for emerging threats
Code Comparison
Sigma rule example:
title: Suspicious Process Creation
detection:
selection:
EventID: 1
Image|endswith: '\cmd.exe'
condition: selection
Elastic rule example:
rule:
name: Suspicious Command Execution
type: eql
query: |
process where process.name : "cmd.exe"
Both repositories focus on providing detection rules for security threats, but Sigma offers a more generic approach, while Protections-artifacts is tailored specifically for Elastic products. Sigma's platform-agnostic nature allows for greater flexibility, but may require additional steps for implementation. Protections-artifacts provides a more streamlined experience for Elastic users, with rules that can be directly applied to their security solutions.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Protections Artifacts
Elastic Security prevents ransomware and malware, detects advanced threats, and arms responders with vital context. Itâs free and open, ready for every endpoint.
Protections-Artifacts is the home of our detection logic (rules, yara, etc) for Elastic Security for endpoint. At Elastic, we believe that being open and transparent is critical for the success of us and our users. Check out our blog post if you are interested in additional background.
Directory
Below you will find the artifacts we have opened in this repository:
Folder | Description |
---|---|
behavior/ | EQL based malicious behavior rules |
yara/ | Yara rules for malware protection |
ransomware/ | Elastic ransomware protection artifact |
Questions? Problems? Suggestions?
If you would like you to provide feedback or contribute to this repository, please familiarize yourself with the applicable artifactâs readme and open an issue using one of the provided templates. We cannot accept pull requests at this time because this repository is automatically generated.
You can also reach us in our Slack Workspace or in the Security Discuss forum.
License
Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use these artifacts except in compliance with the Elastic License 2.0
Contributors must sign a Contributor License Agreement before contributing code to any Elastic repositories.
Top Related Projects
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Splunk Security Content
Cyber Threat Intelligence Repository expressed in STIX 2.0
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Main Sigma Rule Repository
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot