GitHub UEBA - Multiple Alerts from a GitHub Account
editGitHub UEBA - Multiple Alerts from a GitHub Account
editThis rule is part of the "GitHub UEBA - Unusual Activity from Account Pack", and leverages alert data to determine when multiple alerts are executed by the same user in a timespan of one hour. Analysts can use this to prioritize triage and response, as these alerts are a higher indicator of compromised user accounts or PATs.
Rule type: threshold
Rule indices:
- .alerts-security.*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-60m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References: None
Tags:
- Domain: Cloud
- Use Case: Threat Detection
- Use Case: UEBA
- Tactic: Execution
- Rule Type: Higher-Order Rule
- Data Source: Github
Version: 101
Rule authors:
- Elastic
Rule license: Elastic License v2
Rule query
editsignal.rule.tags:("Use Case: UEBA" and "Data Source: Github") and kibana.alert.workflow_status:"open"
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Execution
- ID: TA0002
- Reference URL: https://attack.mitre.org/tactics/TA0002/