1+ [metadata ]
2+ creation_date = " 2025/03/26"
3+ integration = [" endpoint" ]
4+ maturity = " production"
5+ updated_date = " 2025/03/26"
6+
7+ [rule ]
8+ author = [" Elastic" ]
9+ description = """
10+ This rule monitors for the unusual occurrence of outbound network connections to suspicious webservice domains.
11+ """
12+ from = " now-9m"
13+ index = [" logs-endpoint.events.network-*" ]
14+ language = " kuery"
15+ license = " Elastic License v2"
16+ name = " Unusual Network Connection to Suspicious Web Service"
17+ risk_score = 47
18+ rule_id = " b07f0fba-0a78-11f0-8311-b66272739ecb"
19+ severity = " medium"
20+ tags = [
21+ " Domain: Endpoint" ,
22+ " OS: macOS" ,
23+ " Use Case: Threat Detection" ,
24+ " Tactic: Command and Control" ,
25+ " Data Source: Elastic Defend"
26+ ]
27+ timestamp_override = " event.ingested"
28+ type = " new_terms"
29+ query = '''
30+ event.category : "network" and host.os.type : "macos" and event.type : "start" and
31+ destination.domain : (
32+ pastebin.* or
33+ paste.ee or
34+ ghostbin.com or
35+ drive.google.com or
36+ ?.docs.live.net or
37+ api.dropboxapi.* or
38+ content.dropboxapi.* or
39+ *dl.dropboxusercontent.* or
40+ api.onedrive.com or
41+ *.onedrive.org or
42+ onedrive.live.com or
43+ filebin.net or
44+ *.ngrok.io or
45+ ngrok.com or
46+ *.portmap.* or
47+ *serveo.net or
48+ *localtunnel.me or
49+ *pagekite.me or
50+ *localxpose.io or
51+ *notabug.org or
52+ rawcdn.githack.* or
53+ paste.nrecom.net or
54+ zerobin.net or
55+ controlc.com or
56+ requestbin.net or
57+ api.slack.com or
58+ slack-redir.net or
59+ slack-files.com or
60+ cdn.discordapp.com or
61+ discordapp.com or
62+ discord.com or
63+ apis.azureedge.net or
64+ cdn.sql.gg or
65+ ?.top4top.io or
66+ top4top.io or
67+ uplooder.net or
68+ *.cdnmegafiles.com or
69+ transfer.sh or
70+ updates.peer2profit.com or
71+ api.telegram.org or
72+ t.me or
73+ meacz.gq or
74+ rwrd.org or
75+ *.publicvm.com or
76+ *.blogspot.com or
77+ api.mylnikov.org or
78+ script.google.com or
79+ script.googleusercontent.com or
80+ paste4btc.com or
81+ workupload.com or
82+ temp.sh or
83+ filetransfer.io or
84+ gofile.io or
85+ store?.gofile.io or
86+ tiny.one or
87+ api.notion.com or
88+ *.sharepoint.com or
89+ *upload.ee or
90+ bit.ly or
91+ t.ly or
92+ cutt.ly or
93+ mbasic.facebook.com or
94+ api.gofile.io or
95+ file.io or
96+ api.anonfiles.com or
97+ api.trello.com or
98+ gist.githubusercontent.com or
99+ dpaste.com or
100+ *azurewebsites.net or
101+ *.zulipchat.com or
102+ *.4shared.com or
103+ filecloud.me or
104+ i.ibb.co or
105+ files.catbox.moe or
106+ *.getmyip.com or
107+ mockbin.org or
108+ webhook.site or
109+ run.mocky.io or
110+ *infinityfreeapp.com or
111+ free.keep.sh or
112+ tinyurl.com or
113+ ftpupload.net or
114+ lobfile.com or
115+ *.ngrok-free.app or
116+ myexternalip.com or
117+ yandex.ru or
118+ *.yandex.ru or
119+ *.aternos.me or
120+ cdn??.space or
121+ *.pcloud.com or
122+ mediafire.zip or
123+ urlz.fr or
124+ rentry.co or
125+ *.b-cdn.net or
126+ pastecode.dev or
127+ i.imgur.com or
128+ the.earth.li or
129+ *.trycloudflare.com
130+ )
131+ '''
132+
133+ [[rule .threat ]]
134+ framework = " MITRE ATT&CK"
135+
136+ [[rule .threat .technique ]]
137+ id = " T1071"
138+ name = " Application Layer Protocol"
139+ reference = " https://attack.mitre.org/techniques/T1071/"
140+
141+ [[rule .threat .technique .subtechnique ]]
142+ id = " T1071.001"
143+ name = " Web Protocols"
144+ reference = " https://attack.mitre.org/techniques/T1071/001/"
145+
146+ [rule .threat .tactic ]
147+ id = " TA0011"
148+ name = " Command and Control"
149+ reference = " https://attack.mitre.org/tactics/TA0011/"
150+
151+ [rule .new_terms ]
152+ field = " new_terms_fields"
153+ value = [" host.id" , " process.executable" , " destination.domain" ]
154+
155+ [[rule .new_terms .history_window_start ]]
156+ field = " history_window_start"
157+ value = " now-7d"
0 commit comments