Skip to content

Commit 4605370

Browse files
Aegrahtradebot-elastic
authored andcommitted
[New Rule] Successful SSH Authentication from Unusual User (#4481)
* [New Rule] Succesful SSH Authentication from Unusual User * Rename initial_access_first_time_public_key_authentication.toml to initial_access_successful_ssh_authentication_by_unusual_user.toml * Update rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml * Update initial_access_successful_ssh_authentication_by_unusual_user.toml * Update rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml Co-authored-by: Jonhnathan <[email protected]> --------- Co-authored-by: Colson Wilhoit <[email protected]> Co-authored-by: Jonhnathan <[email protected]> (cherry picked from commit f70eafb)
1 parent 72e64f0 commit 4605370

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
[metadata]
2+
creation_date = "2025/02/21"
3+
integration = ["system"]
4+
maturity = "production"
5+
updated_date = "2025/02/21"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
This rule leverages the new_terms rule type to detect successful SSH authentications by a user
11+
who has not been authenticated in the last 10 days. This behavior may indicate an attacker
12+
attempting to gain access to the system using a valid account.
13+
"""
14+
false_positives = [
15+
"""
16+
This rule may trigger in cases where a user has routine work patterns that result in infrequent authentications.
17+
""",
18+
]
19+
from = "now-9m"
20+
index = ["logs-system.auth-*", "filebeat-*"]
21+
language = "kuery"
22+
license = "Elastic License v2"
23+
name = "Successful SSH Authentication from Unusual User"
24+
risk_score = 21
25+
rule_id = "5b8d7b94-23c6-4e3f-baed-3a4d0da4f19d"
26+
severity = "low"
27+
tags = [
28+
"Domain: Endpoint",
29+
"OS: Linux",
30+
"Use Case: Threat Detection",
31+
"Tactic: Initial Access",
32+
"Data Source: Elastic Defend"
33+
]
34+
timestamp_override = "event.ingested"
35+
type = "new_terms"
36+
query = '''
37+
event.category:authentication and host.os.type:linux and event.action:ssh_login and event.outcome:success
38+
'''
39+
40+
[[rule.threat]]
41+
framework = "MITRE ATT&CK"
42+
43+
[rule.threat.tactic]
44+
id = "TA0001"
45+
name = "Initial Access"
46+
reference = "https://attack.mitre.org/tactics/TA0001/"
47+
48+
[[rule.threat.technique]]
49+
id = "T1078"
50+
name = "Valid Accounts"
51+
reference = "https://attack.mitre.org/techniques/T1078/"
52+
53+
[rule.new_terms]
54+
field = "new_terms_fields"
55+
value = ["related.user"]
56+
57+
[[rule.new_terms.history_window_start]]
58+
field = "history_window_start"
59+
value = "now-10d"

0 commit comments

Comments
 (0)