Skip to content

Commit a56443f

Browse files
committed
Update command_and_control_suricata_elastic_defend_c2.toml
1 parent 3c718b5 commit a56443f

File tree

1 file changed

+1
-7
lines changed

1 file changed

+1
-7
lines changed

rules/cross-platform/command_and_control_suricata_elastic_defend_c2.toml

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,7 @@ tags = [
3838
type = "eql"
3939
query = '''
4040
sequence by source.port, source.ip, destination.ip with maxspan=1m
41-
[network where event.module == "suricata" and source.ip != nulll and destination.ip != null and
42-
message in ("Command and Control Traffic", "Potentially Bad Traffic", "A Network Trojan was detected", "Detection of a Network Scan",
43-
"Domain Observed Used for C2 Detected", "Malware Command and Control Activity Detected", "Misc Attack",
44-
"Device Retrieving External IP Address Detected", "Attempted Information Leak", "Web Application Attack",
45-
"SQL Injection Attempt", "Attempted User Privilege Gain", "Attempted Administrator Privilege Gain",
46-
"Executable code was detected", "Webshell Tool Traffic", "Possibly Unwanted Program Detected", "A system call was detected",
47-
"Unknown Traffic", "Crypto Currency Mining Activity Detected", "Possible Social Engineering Attempted")]
41+
[network where event.module == "suricata" and source.ip != null and destination.ip != null]
4842
[network where event.module == "endpoint" and event.action in ("disconnect_received", "connection_attempted")]
4943
'''
5044
note = """## Triage and analysis

0 commit comments

Comments
 (0)