Skip to content

Commit d4b2a35

Browse files
DefSecSentineleric-forte-elasticMikaayenson
authored
[New] Unusual Network Connection to Suspicious Web Service (#4569)
* [New] Unusual Network Connection to Suspicious Web Service * Update rule threat order --------- Co-authored-by: Eric Forte <[email protected]> Co-authored-by: eric-forte-elastic <[email protected]> Co-authored-by: Mika Ayenson, PhD <[email protected]>
1 parent 8bb5e24 commit d4b2a35

File tree

1 file changed

+157
-0
lines changed

1 file changed

+157
-0
lines changed
Lines changed: 157 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,157 @@
1+
[metadata]
2+
creation_date = "2025/03/26"
3+
integration = ["endpoint"]
4+
maturity = "production"
5+
updated_date = "2025/03/26"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
This rule monitors for the unusual occurrence of outbound network connections to suspicious webservice domains.
11+
"""
12+
from = "now-9m"
13+
index = ["logs-endpoint.events.network-*"]
14+
language = "kuery"
15+
license = "Elastic License v2"
16+
name = "Unusual Network Connection to Suspicious Web Service"
17+
risk_score = 47
18+
rule_id = "b07f0fba-0a78-11f0-8311-b66272739ecb"
19+
severity = "medium"
20+
tags = [
21+
"Domain: Endpoint",
22+
"OS: macOS",
23+
"Use Case: Threat Detection",
24+
"Tactic: Command and Control",
25+
"Data Source: Elastic Defend"
26+
]
27+
timestamp_override = "event.ingested"
28+
type = "new_terms"
29+
query = '''
30+
event.category : "network" and host.os.type : "macos" and event.type : "start" and
31+
destination.domain : (
32+
pastebin.* or
33+
paste.ee or
34+
ghostbin.com or
35+
drive.google.com or
36+
?.docs.live.net or
37+
api.dropboxapi.* or
38+
content.dropboxapi.* or
39+
*dl.dropboxusercontent.* or
40+
api.onedrive.com or
41+
*.onedrive.org or
42+
onedrive.live.com or
43+
filebin.net or
44+
*.ngrok.io or
45+
ngrok.com or
46+
*.portmap.* or
47+
*serveo.net or
48+
*localtunnel.me or
49+
*pagekite.me or
50+
*localxpose.io or
51+
*notabug.org or
52+
rawcdn.githack.* or
53+
paste.nrecom.net or
54+
zerobin.net or
55+
controlc.com or
56+
requestbin.net or
57+
api.slack.com or
58+
slack-redir.net or
59+
slack-files.com or
60+
cdn.discordapp.com or
61+
discordapp.com or
62+
discord.com or
63+
apis.azureedge.net or
64+
cdn.sql.gg or
65+
?.top4top.io or
66+
top4top.io or
67+
uplooder.net or
68+
*.cdnmegafiles.com or
69+
transfer.sh or
70+
updates.peer2profit.com or
71+
api.telegram.org or
72+
t.me or
73+
meacz.gq or
74+
rwrd.org or
75+
*.publicvm.com or
76+
*.blogspot.com or
77+
api.mylnikov.org or
78+
script.google.com or
79+
script.googleusercontent.com or
80+
paste4btc.com or
81+
workupload.com or
82+
temp.sh or
83+
filetransfer.io or
84+
gofile.io or
85+
store?.gofile.io or
86+
tiny.one or
87+
api.notion.com or
88+
*.sharepoint.com or
89+
*upload.ee or
90+
bit.ly or
91+
t.ly or
92+
cutt.ly or
93+
mbasic.facebook.com or
94+
api.gofile.io or
95+
file.io or
96+
api.anonfiles.com or
97+
api.trello.com or
98+
gist.githubusercontent.com or
99+
dpaste.com or
100+
*azurewebsites.net or
101+
*.zulipchat.com or
102+
*.4shared.com or
103+
filecloud.me or
104+
i.ibb.co or
105+
files.catbox.moe or
106+
*.getmyip.com or
107+
mockbin.org or
108+
webhook.site or
109+
run.mocky.io or
110+
*infinityfreeapp.com or
111+
free.keep.sh or
112+
tinyurl.com or
113+
ftpupload.net or
114+
lobfile.com or
115+
*.ngrok-free.app or
116+
myexternalip.com or
117+
yandex.ru or
118+
*.yandex.ru or
119+
*.aternos.me or
120+
cdn??.space or
121+
*.pcloud.com or
122+
mediafire.zip or
123+
urlz.fr or
124+
rentry.co or
125+
*.b-cdn.net or
126+
pastecode.dev or
127+
i.imgur.com or
128+
the.earth.li or
129+
*.trycloudflare.com
130+
)
131+
'''
132+
133+
[[rule.threat]]
134+
framework = "MITRE ATT&CK"
135+
136+
[[rule.threat.technique]]
137+
id = "T1071"
138+
name = "Application Layer Protocol"
139+
reference = "https://attack.mitre.org/techniques/T1071/"
140+
141+
[[rule.threat.technique.subtechnique]]
142+
id = "T1071.001"
143+
name = "Web Protocols"
144+
reference = "https://attack.mitre.org/techniques/T1071/001/"
145+
146+
[rule.threat.tactic]
147+
id = "TA0011"
148+
name = "Command and Control"
149+
reference = "https://attack.mitre.org/tactics/TA0011/"
150+
151+
[rule.new_terms]
152+
field = "new_terms_fields"
153+
value = ["host.id", "process.executable", "destination.domain"]
154+
155+
[[rule.new_terms.history_window_start]]
156+
field = "history_window_start"
157+
value = "now-7d"

0 commit comments

Comments
 (0)