Skip to content

Commit f536d6e

Browse files
fixed references; linted
1 parent a1dd2ca commit f536d6e

File tree

3 files changed

+36
-17
lines changed

3 files changed

+36
-17
lines changed

detection_rules/etc/non-ecs-schema.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
"TargetLogonId": "keyword",
4444
"TargetProcessGUID": "keyword",
4545
"TargetSid": "keyword",
46-
"SchemaFriendlyName": "keyword",
46+
"SchemaFriendlyName": "keyword",
4747
"Resource": "keyword",
4848
"RpcCallClientLocality": "keyword",
4949
"PrivilegeList": "keyword",
@@ -207,5 +207,17 @@
207207
"logs-okta*": {
208208
"okta.debug_context.debug_data.flattened.requestedScopes": "keyword",
209209
"okta.debug_context.debug_data.flattened.grantType": "keyword"
210+
},
211+
"logs-network_traffic.http*": {
212+
"data_stream.dataset": "keyword",
213+
"url.path": "keyword",
214+
"http.request.referrer": "keyword",
215+
"http.request.headers.content-type": "keyword",
216+
"network.direction": "keyword",
217+
"http.request.method": "keyword",
218+
"request": "keyword",
219+
"http.request.body.bytes": "long",
220+
"http.request.body.content": "keyword",
221+
"http.response.headers.server": "keyword"
210222
}
211223
}

rules/network/execution_potential_rce_via_toolshell.toml

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,24 +7,28 @@ updated_date = "2025/07/23"
77
[rule]
88
author = ["Elastic"]
99
description = """
10-
Detects potential remote code execution (RCE) attempts targeting IIS web servers running SharePoint via malicious VIEWSTATE payloads in HTTP POST requests. Attackers may exploit insecure deserialization in the VIEWSTATE parameter to execute arbitrary code. This rule identifies suspicious requests containing VIEWSTATE data and other indicators of exploitation, specifically those associated with the Toolshell exploit chain. Toolshell leverages vulnerabilities (CVE-2025-53770 and CVE-2025-53771) for initial access, enabling adversaries to deploy a webshell, steal machine keys, sign VIEWSTATE payloads offline, and subsequently send signed payloads to the server to achieve code execution.
10+
Detects potential remote code execution (RCE) attempts targeting IIS web servers running SharePoint via malicious
11+
VIEWSTATE payloads in HTTP POST requests. Attackers may exploit insecure deserialization in the VIEWSTATE parameter to
12+
execute arbitrary code. This rule identifies suspicious requests containing VIEWSTATE data and other indicators of
13+
exploitation, specifically those associated with the Toolshell exploit chain. Toolshell leverages vulnerabilities
14+
(CVE-2025-53770 and CVE-2025-53771) for initial access, enabling adversaries to deploy a webshell, steal machine keys,
15+
sign VIEWSTATE payloads offline, and subsequently send signed payloads to the server to achieve code execution.
1116
"""
1217
from = "now-9m"
1318
index = ["logs-network_traffic.http*"]
1419
language = "kuery"
1520
license = "Elastic License v2"
1621
max_signals = 10
1722
name = "Potential VIEWSTATE RCE Attempt on SharePoint/IIS"
18-
reference = [
23+
references = [
1924
"https://research.eye.security/sharepoint-under-siege/",
2025
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
2126
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770",
22-
"https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
27+
"https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/",
2328
]
2429
risk_score = 73
2530
rule_id = "99c9af5a-67cf-11f0-b69e-f661ea17fbcd"
26-
setup = """
27-
### Network Traffic Setup
31+
setup = """### Network Traffic Setup
2832
2933
This rule requires network traffic logs to be collected from HTTP endpoints, focusing on IIS web servers and SharePoint sites. Ensure logging captures HTTP request and response details, including headers and request bodies for POST requests. Monitoring VIEWSTATE content is critical for detecting deserialization attacks.
3034
"""
@@ -38,6 +42,7 @@ tags = [
3842
]
3943
timestamp_override = "event.ingested"
4044
type = "query"
45+
4146
query = '''
4247
data_stream.dataset : "network_traffic.http" and
4348
network.direction: "ingress" and
@@ -49,15 +54,17 @@ data_stream.dataset : "network_traffic.http" and
4954
http.response.headers.server: Microsoft-IIS*
5055
'''
5156

57+
5258
[[rule.threat]]
5359
framework = "MITRE ATT&CK"
54-
5560
[[rule.threat.technique]]
5661
id = "T1203"
5762
name = "Exploitation for Client Execution"
5863
reference = "https://attack.mitre.org/techniques/T1203/"
5964

65+
6066
[rule.threat.tactic]
6167
id = "TA0002"
6268
name = "Execution"
6369
reference = "https://attack.mitre.org/tactics/TA0002/"
70+

rules/network/initial_access_potential_toolshell_exploit_attempt.toml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
2-
31
[metadata]
42
creation_date = "2025/05/23"
53
integration = ["network_traffic"]
@@ -9,26 +7,25 @@ updated_date = "2025/05/23"
97
[rule]
108
author = ["Elastic"]
119
description = """
12-
Identifies potential exploitation of CVE-2025-53770 and CVE-2025-53771 in IIS web servers on SharePoint sites.
13-
Toolshell is an exploit chain that leverages vulnerabilities in SharePoint/IIS to gain unauthorized access
14-
and execute commands. This rule detects HTTP requests that match specific patterns indicative of the exploit attempt.
10+
Identifies potential exploitation of CVE-2025-53770 and CVE-2025-53771 in IIS web servers on SharePoint sites. Toolshell
11+
is an exploit chain that leverages vulnerabilities in SharePoint/IIS to gain unauthorized access and execute commands.
12+
This rule detects HTTP requests that match specific patterns indicative of the exploit attempt.
1513
"""
1614
from = "now-9m"
1715
index = ["logs-network_traffic.http*"]
1816
language = "kuery"
1917
license = "Elastic License v2"
2018
max_signals = 10
2119
name = "Potential Toolshell Initial Exploit (CVE-2025-53770 & CVE-2025-53771)"
22-
reference = [
20+
references = [
2321
"https://research.eye.security/sharepoint-under-siege/",
2422
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
2523
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770",
26-
"https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
24+
"https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/",
2725
]
2826
risk_score = 47
2927
rule_id = "6e4f6446-67ca-11f0-a148-f661ea17fbcd"
30-
setup = """
31-
### Network Traffic Setup
28+
setup = """### Network Traffic Setup
3229
3330
This rule requires network traffic logs to be collected from HTTP endpoints, specifically focusing on IIS web servers. Ensure that your network traffic logging is configured to capture HTTP request and response details, including request and response headers. Additionally, request bodies are necessary for content-type `application/x-www-form-urlencoded` to detect potential exploit attempts.
3431
"""
@@ -42,6 +39,7 @@ tags = [
4239
]
4340
timestamp_override = "event.ingested"
4441
type = "query"
42+
4543
query = '''
4644
data_stream.dataset : "network_traffic.http" and
4745
url.path: /_layouts*ToolPane.aspx and
@@ -53,15 +51,17 @@ data_stream.dataset : "network_traffic.http" and
5351
http.request.body.bytes > 5000
5452
'''
5553

54+
5655
[[rule.threat]]
5756
framework = "MITRE ATT&CK"
58-
5957
[[rule.threat.technique]]
6058
id = "T1190"
6159
name = "Exploit Public-Facing Application"
6260
reference = "https://attack.mitre.org/techniques/T1190/"
6361

62+
6463
[rule.threat.tactic]
6564
id = "TA0001"
6665
name = "Initial Access"
6766
reference = "https://attack.mitre.org/tactics/TA0001/"
67+

0 commit comments

Comments
 (0)