Skip to content

Commit 753e8d8

Browse files
[New] Unusual Network Connection to Suspicious Top Level Domain (#4563)
1 parent d4b2a35 commit 753e8d8

File tree

1 file changed

+67
-0
lines changed

1 file changed

+67
-0
lines changed
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
[metadata]
2+
creation_date = "2025/03/25"
3+
integration = ["endpoint"]
4+
maturity = "production"
5+
updated_date = "2025/03/25"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
This rule monitors for the unusual occurrence of outbound network connections to suspicious top level domains.
11+
"""
12+
from = "now-9m"
13+
index = ["logs-endpoint.events.network-*"]
14+
language = "kuery"
15+
license = "Elastic License v2"
16+
name = "Unusual Network Connection to Suspicious Top Level Domain"
17+
risk_score = 47
18+
rule_id = "ffa676dc-09b0-11f0-94ba-b66272739ecb"
19+
severity = "medium"
20+
tags = [
21+
"Domain: Endpoint",
22+
"OS: macOS",
23+
"Use Case: Threat Detection",
24+
"Tactic: Command and Control",
25+
"Data Source: Elastic Defend"
26+
]
27+
timestamp_override = "event.ingested"
28+
type = "new_terms"
29+
query = '''
30+
event.category : "network" and host.os.type : "macos" and event.type : "start" and
31+
destination.domain : (*.team or *.lol or *.kr or *.ke or *.nu or *.space or
32+
*.capital or *.in or *.cfd or *.online or *.ru or
33+
*.info or *.top or *.buzz or *.xyz or *.rest or
34+
*.ml or *.cf or *.gq or *.ga or *.onion or
35+
*.network or *.monster or *.marketing or *.cyou or
36+
*.quest or *.cc or *.bar or *.click or *.cam or
37+
*.surf or *.tk or *.shop or *.club or *.icu or
38+
*.pw or *.ws or *.hair or *.mom or
39+
*.beauty or *.boats or *.fun or *.life or
40+
*.store)
41+
'''
42+
43+
[[rule.threat]]
44+
framework = "MITRE ATT&CK"
45+
46+
[[rule.threat.technique]]
47+
id = "T1071"
48+
name = "Application Layer Protocol"
49+
reference = "https://attack.mitre.org/techniques/T1071/"
50+
51+
[[rule.threat.technique.subtechnique]]
52+
id = "T1071.001"
53+
name = "Web Protocols"
54+
reference = "https://attack.mitre.org/techniques/T1071/001/"
55+
56+
[rule.threat.tactic]
57+
id = "TA0011"
58+
name = "Command and Control"
59+
reference = "https://attack.mitre.org/tactics/TA0011/"
60+
61+
[rule.new_terms]
62+
field = "new_terms_fields"
63+
value = ["host.id", "process.executable", "destination.domain"]
64+
65+
[[rule.new_terms.history_window_start]]
66+
field = "history_window_start"
67+
value = "now-7d"

0 commit comments

Comments
 (0)