You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -62,7 +62,7 @@ note = """## Triage and analysis
62
62
> **Disclaimer**:
63
63
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
64
64
65
-
### Investigating Potential Non-Standard Port SSH connection
65
+
### Investigating Deprecated - Potential Non-Standard Port SSH connection
66
66
67
67
SSH is a protocol used for secure remote access and management of systems. Typically, it operates over port 22. However, adversaries may exploit non-standard ports to evade detection and bypass network filters. The detection rule identifies unusual SSH activity by monitoring processes and network connections on ports other than 22, excluding common benign use cases, to flag potential threats.
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
24
-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
25
-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
26
-
`event.ingested` to @timestamp.
27
-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
28
-
"""
29
-
severity = "medium"
30
-
tags = [
31
-
"Domain: Endpoint",
32
-
"OS: Linux",
33
-
"OS: macOS",
34
-
"Use Case: Threat Detection",
35
-
"Tactic: Defense Evasion",
36
-
"Data Source: Elastic Defend",
37
-
"Data Source: Elastic Endgame",
38
-
"Data Source: Auditd Manager",
39
-
"Resources: Investigation Guide",
40
-
]
41
-
timestamp_override = "event.ingested"
42
-
type = "eql"
43
-
44
-
query = '''
45
-
process where event.action in ("exec", "exec_event", "executed", "process_started") and event.type == "start" and
46
-
(
47
-
((process.args : ("rm", "echo") or
48
-
(process.args : "ln" and process.args : "-sf" and process.args : "/dev/null") or
49
-
(process.args : "truncate" and process.args : "-s0"))
50
-
and process.args : (".bash_history", "/root/.bash_history", "/home/*/.bash_history","/Users/.bash_history", "/Users/*/.bash_history",
51
-
".zsh_history", "/root/.zsh_history", "/home/*/.zsh_history", "/Users/.zsh_history", "/Users/*/.zsh_history")) or
52
-
(process.args : "history" and process.args : "-c") or
53
-
(process.args : "export" and process.args : ("HISTFILE=/dev/null", "HISTFILESIZE=0")) or
54
-
(process.args : "unset" and process.args : "HISTFILE") or
55
-
(process.args : "set" and process.args : "history" and process.args : "+o")
56
-
)
57
-
'''
58
18
note = """## Triage and analysis
59
19
60
20
> **Disclaimer**:
@@ -89,23 +49,71 @@ Shell command-line history is a crucial feature in Unix-like systems, recording
89
49
- Implement stricter access controls and monitoring on the affected system to prevent unauthorized users from modifying shell history files in the future.
90
50
- Escalate the incident to the security operations team for further investigation and to determine if additional systems may have been compromised.
91
51
- Review and update endpoint detection and response (EDR) configurations to enhance monitoring for similar tampering attempts, ensuring alerts are generated for any future suspicious command patterns."""
@@ -87,6 +52,42 @@ In Linux and macOS environments, file execution is determined by the file's true
87
52
- Review and update endpoint protection settings to block execution of files with suspicious naming conventions, such as those ending with a space.
88
53
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to assess potential impacts on other systems.
89
54
- Implement additional monitoring for similar masquerading attempts by enhancing logging and alerting mechanisms to detect files with unusual naming patterns."""
0 commit comments