Credential Dumping - Detected - Elastic Endgame

edit

Elastic Endgame detected Credential Dumping. Click the Elastic Endgame icon in the event.module column or the link in the rule.reference column for additional information.

Rule type: query

Rule indices:

  • endgame-*

Severity: high

Risk score: 73

Runs every: 10 minutes

Searches indices from: now-15m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 10000

Tags:

  • Elastic
  • Elastic Endgame
  • Threat Detection
  • Credential Access

Version: 100 (version history)

Added (Elastic Stack release): 7.6.0

Last modified (Elastic Stack release): 8.5.0

Rule authors: Elastic

Rule license: Elastic License v2

Rule query

edit
event.kind:alert and event.module:endgame and
endgame.metadata.type:detection and (event.action:cred_theft_event or
endgame.event_subtype_full:cred_theft_event)

Threat mapping

edit

Framework: MITRE ATT&CKTM

Rule version history

edit
Version 100 (8.5.0 release)
  • Formatting only
Version 9 (8.4.0 release)
  • Formatting only
Version 7 (8.0.0 release)
  • Formatting only
Version 6 (7.12.1 release)
  • Formatting only
Version 5 (7.12.0 release)
  • Rule name changed from: Credential Dumping - Detected - Endpoint Security
Version 4 (7.10.0 release)
  • Rule name changed from: Credential Dumping - Detected - Elastic Endpoint Security
Version 3 (7.9.0 release)
  • Rule name changed from: Credential Dumping - Detected - Elastic Endpoint
Version 2 (7.7.0 release)
  • Updated query, changed from:

    event.kind:alert and event.module:endgame and
    event.action:cred_theft_event and endgame.metadata.type:detection