Skip to content

Commit c6b8239

Browse files
committed
regenerate guides
1 parent d128721 commit c6b8239

File tree

901 files changed

+30998
-1115
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

901 files changed

+30998
-1115
lines changed

rules/apm/apm_403_response_to_a_post.toml

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/02/18"
33
integration = ["apm"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2025/01/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,4 +32,38 @@ type = "query"
3232
query = '''
3333
http.response.status_code:403 and http.request.method:post
3434
'''
35+
note = """## Triage and analysis
36+
37+
> **Disclaimer**:
38+
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
39+
40+
### Investigating Web Application Suspicious Activity: POST Request Declined
41+
42+
Web applications often use POST requests to handle data submissions securely. However, adversaries may exploit this by attempting unauthorized actions, triggering a 403 error when access is denied. The detection rule identifies such anomalies by flagging POST requests that receive a 403 response, indicating potential misuse or probing attempts, thus aiding in early threat detection.
43+
44+
### Possible investigation steps
45+
46+
- Review the source IP address and user agent associated with the POST request to identify any patterns or known malicious actors.
47+
- Examine the URL or endpoint targeted by the POST request to determine if it is a sensitive or restricted resource.
48+
- Check the timestamp of the request to see if it coincides with other suspicious activities or known attack patterns.
49+
- Analyze the frequency and volume of similar 403 POST requests from the same source to assess if this is part of a larger probing or attack attempt.
50+
- Investigate any recent changes or updates to the web application that might have inadvertently triggered legitimate requests to be denied.
51+
52+
### False positive analysis
53+
54+
- Legitimate API interactions may trigger 403 responses if the API endpoint is accessed without proper authentication or authorization. Review API access logs to identify and whitelist known applications or users that frequently interact with the API.
55+
- Web application firewalls (WAFs) might block certain POST requests due to predefined security rules, resulting in 403 errors. Analyze WAF logs to determine if specific rules are causing false positives and adjust the ruleset accordingly.
56+
- Automated scripts or bots performing routine tasks might inadvertently trigger 403 responses. Identify these scripts and ensure they are configured with the necessary permissions or exclude their IP addresses from the detection rule.
57+
- User error, such as incorrect form submissions or missing required fields, can lead to 403 responses. Educate users on proper form usage and consider implementing client-side validation to reduce these occurrences.
58+
- Maintenance or configuration changes in the web application might temporarily cause 403 errors. Coordinate with the development or operations team to understand scheduled changes and adjust monitoring rules during these periods.
59+
60+
### Response and remediation
61+
62+
- Immediately review the logs associated with the 403 POST requests to identify the source IP addresses and user agents involved. Block any suspicious IP addresses at the firewall or web application firewall (WAF) to prevent further unauthorized attempts.
63+
- Conduct a thorough review of the web application's access control policies and permissions to ensure that they are correctly configured to prevent unauthorized actions.
64+
- Check for any recent changes or updates to the web application that might have inadvertently altered access controls or introduced vulnerabilities, and roll back or patch as necessary.
65+
- Notify the security operations team to monitor for any additional suspicious activity from the identified IP addresses or similar patterns, and escalate to incident response if further malicious activity is detected.
66+
- Implement additional logging and monitoring for POST requests that result in 403 responses to enhance detection capabilities and gather more context for future incidents.
67+
- Review and update the web application firewall (WAF) rules to better detect and block unauthorized POST requests, ensuring that legitimate traffic is not affected.
68+
- If applicable, engage with the development team to conduct a security review of the application code to identify and fix any potential vulnerabilities that could be exploited by attackers."""
3569

rules/apm/apm_405_response_method_not_allowed.toml

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/02/18"
33
integration = ["apm"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2025/01/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,4 +32,38 @@ type = "query"
3232
query = '''
3333
http.response.status_code:405
3434
'''
35+
note = """## Triage and analysis
36+
37+
> **Disclaimer**:
38+
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
39+
40+
### Investigating Web Application Suspicious Activity: Unauthorized Method
41+
42+
Web applications often restrict HTTP methods to protect resources, allowing only specific actions like GET or POST. Adversaries may exploit misconfigurations by attempting unauthorized methods, potentially revealing vulnerabilities or sensitive data. The detection rule identifies such attempts by flagging HTTP 405 responses, indicating a method is not permitted, thus highlighting potential misuse or probing activities.
43+
44+
### Possible investigation steps
45+
46+
- Review the web server logs to identify the source IP address associated with the HTTP 405 response to determine if the request originated from a known or suspicious source.
47+
- Analyze the request headers and payload associated with the 405 response to understand what unauthorized method was attempted and if there are any patterns or anomalies.
48+
- Check the application configuration to verify which HTTP methods are allowed for the resource in question and assess if there are any misconfigurations that could be exploited.
49+
- Investigate if there are multiple 405 responses from the same source IP or user agent, which could indicate probing or automated scanning activity.
50+
- Correlate the 405 response events with other security alerts or logs to identify any related suspicious activities or potential attack vectors.
51+
52+
### False positive analysis
53+
54+
- Routine API calls using unsupported methods may trigger 405 responses. Review API documentation to ensure correct methods are used and adjust monitoring to exclude these known patterns.
55+
- Automated tools or scripts might inadvertently use incorrect HTTP methods, leading to false positives. Identify and update these tools to use appropriate methods, or whitelist their IP addresses if they are known and trusted.
56+
- Web crawlers or bots might attempt unsupported methods as part of their scanning process. Configure your monitoring system to recognize and exclude these benign activities based on user-agent strings or IP ranges.
57+
- Development and testing environments often experiment with various HTTP methods, resulting in 405 responses. Implement rules to exclude these environments from production monitoring to reduce noise.
58+
- Legacy systems or applications might not support certain HTTP methods, causing frequent 405 errors. Document these systems and create exceptions in your monitoring to prevent unnecessary alerts.
59+
60+
### Response and remediation
61+
62+
- Immediately review the web server and application logs to identify the source IP address and user agent associated with the 405 response. Block the IP address if it is determined to be malicious or part of a known attack pattern.
63+
- Conduct a security assessment of the web application's configuration to ensure that only necessary HTTP methods are enabled for each resource. Disable any methods that are not required for the application's functionality.
64+
- Implement or update web application firewall (WAF) rules to block unauthorized HTTP methods and monitor for repeated attempts from the same source.
65+
- Notify the security operations team to monitor for any additional suspicious activity from the identified source or similar patterns, and escalate to incident response if further malicious activity is detected.
66+
- Review and update the application's security policies and access controls to ensure they align with best practices and prevent unauthorized method usage.
67+
- Conduct a vulnerability assessment of the web application to identify and remediate any potential security weaknesses that could be exploited by unauthorized HTTP methods.
68+
- Document the incident, including the response actions taken, and update the incident response plan to improve future detection and response capabilities for similar threats."""
3569

rules/apm/apm_sqlmap_user_agent.toml

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/02/18"
33
integration = ["apm"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2025/01/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,4 +32,39 @@ type = "query"
3232
query = '''
3333
user_agent.original:"sqlmap/1.3.11#stable (http://sqlmap.org)"
3434
'''
35+
note = """## Triage and analysis
36+
37+
> **Disclaimer**:
38+
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
39+
40+
### Investigating Web Application Suspicious Activity: sqlmap User Agent
41+
42+
Sqlmap is a widely-used open-source tool designed to automate the detection and exploitation of SQL injection vulnerabilities in web applications. Adversaries may exploit sqlmap to extract sensitive data or manipulate databases. The detection rule identifies suspicious activity by monitoring for specific user agent strings associated with sqlmap, flagging potential unauthorized testing or attacks on web applications.
43+
44+
### Possible investigation steps
45+
46+
- Review the logs to identify the source IP address associated with the user agent string "sqlmap/1.3.11#stable (http://sqlmap.org)" to determine the origin of the suspicious activity.
47+
- Check for any other user agent strings or unusual activity from the same IP address to assess if there are additional signs of probing or attacks.
48+
- Investigate the targeted web application endpoints to understand which parts of the application were accessed and if any SQL injection attempts were successful.
49+
- Correlate the timestamp of the detected activity with other security logs or alerts to identify any concurrent suspicious activities or anomalies.
50+
- Assess the potential impact by reviewing database logs or application logs for any unauthorized data access or modifications during the time of the detected activity.
51+
- Consider blocking or monitoring the identified IP address to prevent further unauthorized access attempts, if deemed malicious.
52+
53+
### False positive analysis
54+
55+
- Development and testing environments may use sqlmap for legitimate security testing. To handle this, create exceptions for known IP addresses or user agents associated with internal security teams.
56+
- Automated security scanners or vulnerability assessment tools might mimic sqlmap's user agent for testing purposes. Identify and whitelist these tools to prevent unnecessary alerts.
57+
- Some web application firewalls or intrusion detection systems may simulate sqlmap activity to test their own detection capabilities. Coordinate with your security infrastructure team to recognize and exclude these activities.
58+
- Educational institutions or training environments might use sqlmap for teaching purposes. Establish a list of authorized users or networks to exclude from alerts.
59+
- Ensure that any third-party security service providers are recognized and their activities are documented to avoid misidentification as threats.
60+
61+
### Response and remediation
62+
63+
- Immediately block the IP address associated with the sqlmap user agent activity to prevent further unauthorized access attempts.
64+
- Review and analyze web server logs to identify any additional suspicious activity or patterns that may indicate further exploitation attempts.
65+
- Conduct a thorough assessment of the affected web application to identify and patch any SQL injection vulnerabilities that may have been exploited.
66+
- Reset credentials and enforce strong password policies for any database accounts that may have been compromised.
67+
- Implement web application firewall (WAF) rules to detect and block SQL injection attempts, including those using sqlmap.
68+
- Notify the security operations team and relevant stakeholders about the incident for awareness and further investigation.
69+
- Document the incident details and response actions taken for future reference and to enhance incident response procedures."""
3570

rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/06/19"
33
integration = ["endpoint", "system"]
44
maturity = "production"
5-
updated_date = "2024/08/09"
5+
updated_date = "2025/01/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -49,6 +49,41 @@ process where
4949
/* Look for Google Drive download URL with AV flag skipping */
5050
(process.command_line : "*drive.google.com*" and process.command_line : "*export=download*" and process.command_line : "*confirm=no_antivirus*")
5151
'''
52+
note = """## Triage and analysis
53+
54+
> **Disclaimer**:
55+
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
56+
57+
### Investigating Suspicious File Downloaded from Google Drive
58+
59+
Google Drive is a widely-used cloud storage service that allows users to store and share files. Adversaries may exploit its trusted nature to distribute malicious files, bypassing security measures by using download links with antivirus checks disabled. The detection rule identifies such activities by monitoring browser processes for specific Google Drive download patterns, flagging potential threats for further investigation.
60+
61+
### Possible investigation steps
62+
63+
- Review the process command line details to confirm the presence of the Google Drive download URL with the "export=download" and "confirm=no_antivirus" parameters, which indicate an attempt to bypass antivirus checks.
64+
- Identify the user account associated with the process to determine if the activity aligns with their typical behavior or if it appears suspicious.
65+
- Check the file downloaded from the Google Drive URL for any known malicious signatures or behaviors using a reputable antivirus or malware analysis tool.
66+
- Investigate the source of the download link to determine if it was shared via email, messaging, or another communication channel, and assess the legitimacy of the source.
67+
- Analyze network logs to identify any additional suspicious activity or connections related to the IP address or domain associated with the download.
68+
- Review historical data for any previous similar alerts or activities involving the same user or device to identify potential patterns or repeated attempts.
69+
70+
### False positive analysis
71+
72+
- Legitimate file sharing activities from Google Drive may trigger alerts if users frequently download files for business purposes. To manage this, create exceptions for specific users or departments known to use Google Drive extensively for legitimate work.
73+
- Automated scripts or tools that download files from Google Drive for regular data processing tasks might be flagged. Identify these scripts and whitelist their associated processes or command lines to prevent unnecessary alerts.
74+
- Educational institutions or research organizations often share large datasets via Google Drive, which could be mistakenly flagged. Implement exceptions for known educational or research-related Google Drive URLs to reduce false positives.
75+
- Internal IT or security teams may use Google Drive to distribute software updates or patches. Recognize these activities and exclude them by specifying trusted internal Google Drive links or user accounts.
76+
- Collaboration with external partners who use Google Drive for file sharing can lead to false positives. Establish a list of trusted partners and their associated Google Drive URLs to minimize unnecessary alerts.
77+
78+
### Response and remediation
79+
80+
- Immediately isolate the affected system from the network to prevent further spread of potential malware or unauthorized access.
81+
- Quarantine the downloaded file and perform a detailed malware analysis using a sandbox environment to determine its behavior and potential impact.
82+
- If malware is confirmed, initiate a full system scan using updated antivirus and anti-malware tools to identify and remove any additional threats.
83+
- Review and analyze the process command line logs to identify any other suspicious activities or downloads that may have occurred concurrently.
84+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are compromised.
85+
- Implement network-level blocking of the specific Google Drive URL or domain if it is confirmed to be malicious, to prevent future access.
86+
- Update endpoint detection and response (EDR) systems with indicators of compromise (IOCs) identified during the analysis to enhance detection of similar threats in the future."""
5287

5388

5489
[[rule.threat]]

0 commit comments

Comments
 (0)