Skip to content

Commit e7a627c

Browse files
updated mitre; adjusted non-ecs schema; fixed query
1 parent e327b28 commit e7a627c

File tree

2 files changed

+19
-16
lines changed

2 files changed

+19
-16
lines changed

detection_rules/etc/non-ecs-schema.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,8 @@
150150
"logs-aws.cloudtrail-*": {
151151
"aws.cloudtrail.flattened.request_parameters.cidrIp": "keyword",
152152
"aws.cloudtrail.flattened.request_parameters.fromPort": "keyword",
153-
"aws.cloudtrail.flattened.request_parameters.roleArn": "keyword"
153+
"aws.cloudtrail.flattened.request_parameters.roleArn": "keyword",
154+
"aws.cloudtrail.request_parameters.protocol": "keyword"
154155
},
155156
"logs-azure.signinlogs-*": {
156157
"azure.signinlogs.properties.conditional_access_audiences.application_id": "keyword"

rules/integrations/aws/exfiltration_sns_email_subscription_by_rare_user.toml

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,22 @@ updated_date = "2024/11/01"
77
[rule]
88
author = ["Elastic"]
99
description = """
10-
Identifies when an SNS topic is subscribed to by an email address by a user whom does not typically perform this action. Adversaries may subscribe to an SNS topic to collect sensitive information or exfiltrate data via an external email address.
10+
Identifies when an SNS topic is subscribed to by an email address by a user whom does not typically perform this action.
11+
Adversaries may subscribe to an SNS topic to collect sensitive information or exfiltrate data via an external email
12+
address.
1113
"""
1214
false_positives = [
1315
"""
14-
Legitimate users may subscribe to SNS topics for legitimate purposes. Ensure that the subscription is authorized and the subscription email address is known before taking action.
16+
Legitimate users may subscribe to SNS topics for legitimate purposes. Ensure that the subscription is authorized and
17+
the subscription email address is known before taking action.
1518
""",
1619
]
1720
from = "now-9m"
1821
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
1922
language = "kuery"
2023
license = "Elastic License v2"
2124
name = "AWS SNS Email Subscription by Rare User"
22-
note = """
23-
## Triage and Analysis
25+
note = """## Triage and Analysis
2426
2527
### Investigating AWS SNS Email Subscription by Rare User
2628
@@ -56,9 +58,7 @@ This rule identifies when an SNS topic is subscribed to by an email address by a
5658
For further guidance on managing and securing SNS topics in AWS environments, refer to the [AWS SNS documentation](https://docs.aws.amazon.com/sns/latest/dg/welcome.html) and AWS best practices for security.
5759
5860
"""
59-
references = [
60-
"https://docs.aws.amazon.com/sns/latest/api/API_Subscribe.html",
61-
]
61+
references = ["https://docs.aws.amazon.com/sns/latest/api/API_Subscribe.html"]
6262
risk_score = 23
6363
rule_id = "3df49ff6-985d-11ef-88a1-f661ea17fbcd"
6464
severity = "low"
@@ -75,18 +75,20 @@ timestamp_override = "event.ingested"
7575
type = "new_terms"
7676

7777
query = '''
78-
event.dataset == "aws.cloudtrail"
79-
and event.provider == "sns.amazonaws.com"
80-
and event.action == "Subscribe"
81-
and aws.cloudtrail.request_parameters.protocol == "email"
78+
event.dataset: "aws.cloudtrail"
79+
and event.provider: "sns.amazonaws.com"
80+
and event.action: "Subscribe"
81+
and aws.cloudtrail.request_parameters.protocol: "email"
8282
'''
8383

84+
8485
[[rule.threat]]
8586
framework = "MITRE ATT&CK"
8687
[[rule.threat.technique]]
87-
id = "T1537"
88-
name = "Transfer Data to Cloud Account"
89-
reference = "https://attack.mitre.org/techniques/T1537/"
88+
id = "T1567"
89+
name = "Exfiltration Over Web Service"
90+
reference = "https://attack.mitre.org/techniques/T1567/"
91+
9092

9193
[rule.threat.tactic]
9294
id = "TA0010"
@@ -98,4 +100,4 @@ field = "new_terms_fields"
98100
value = ["aws.cloudtrail.user_identity.arn"]
99101
[[rule.new_terms.history_window_start]]
100102
field = "history_window_start"
101-
value = "now-14d"
103+
value = "now-14d"

0 commit comments

Comments
 (0)