-
Notifications
You must be signed in to change notification settings - Fork 613
[New] Suricata and Elastic Defend Network Correlation #5443
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
Samirbous
wants to merge
15
commits into
main
Choose a base branch
from
ET_SURIC
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from 11 commits
Commits
Show all changes
15 commits
Select commit
Hold shift + click to select a range
e749279
[New] Suricata and Elastic Defend - Command and Control Correlation
Samirbous e5eee69
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous 3c718b5
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous a56443f
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous 34dbd8f
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous 1d2d7ed
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous f33a879
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous a4ae0de
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous ca8d32d
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous 141b543
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous 87a0ff1
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous b14c1b8
Update rules/cross-platform/command_and_control_suricata_elastic_defe…
w0rk3r e7a1ab8
Update rules/cross-platform/command_and_control_suricata_elastic_defe…
Samirbous a14651d
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous a2a6786
Update command_and_control_suricata_elastic_defend_c2.toml
Samirbous File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
77 changes: 77 additions & 0 deletions
77
rules/cross-platform/command_and_control_suricata_elastic_defend_c2.toml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,77 @@ | ||
| [metadata] | ||
| creation_date = "2025/12/10" | ||
| integration = ["endpoint"] | ||
| maturity = "production" | ||
| updated_date = "2025/12/10" | ||
|
|
||
| [rule] | ||
| author = ["Elastic"] | ||
| description = """ | ||
| This detection correlates Suricata alerts with Elastic Defend network events to identify the source process performing | ||
| the network activity. | ||
| """ | ||
| from = "now-9m" | ||
| index = ["logs-endpoint.events.network-*", "filebeat-*", "logs-suricata.*"] | ||
| language = "eql" | ||
| license = "Elastic License v2" | ||
| name = "Suricata and Elastic Defend Network Correlation" | ||
| references = [ | ||
| "https://attack.mitre.org/tactics/TA0011/", | ||
| "https://www.elastic.co/docs/reference/integrations/suricata", | ||
| "https://www.elastic.co/docs/reference/integrations/endpoint" | ||
| ] | ||
| risk_score = 47 | ||
| rule_id = "9edd000e-cbd1-4d6a-be72-2197b5625a05" | ||
| severity = "medium" | ||
| tags = [ | ||
| "Domain: Endpoint", | ||
| "Domain: Network", | ||
| "OS: Linux", | ||
| "OS: Windows", | ||
| "OS: macOS", | ||
| "Use Case: Threat Detection", | ||
| "Tactic: Command and Control", | ||
| "Data Source: Elastic Defend", | ||
| "Data Source: Suricata", | ||
| "Resources: Investigation Guide", | ||
| ] | ||
| type = "eql" | ||
| query = ''' | ||
| sequence by source.port, source.ip, destination.ip with maxspan=1m | ||
| [network where event.module == "suricata" and event.category == "intrusion_detection" and event.kind == "alert" and source.ip != null and destination.ip != null] | ||
Samirbous marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| [network where event.module == "endpoint" and event.action in ("disconnect_received", "connection_attempted")] | ||
| ''' | ||
| note = """## Triage and analysis | ||
|
|
||
| ### Investigating Suricata and Elastic Defend Network Correlation | ||
|
|
||
| ### Possible investigation steps | ||
|
|
||
| - Investigate in the Timeline feature the two events matching this correlation (Suricata and Elastic Defend). | ||
| - Review the process details like command_line, privileges, global relevance and reputation. | ||
| - Assess the destination.ip reputation and global relevance. | ||
| - Review the parent process execution details like command_line, global relevance and reputation. | ||
| - Examine all network connection details performed by the process during last 48h. | ||
| - Correlate the alert with other security events or logs to identify any patterns or additional indicators of compromise related to the same process or network activity. | ||
|
|
||
| ### False positive analysis | ||
|
|
||
| - Trusted system or third party processes performing network activity that looks like beaconing. | ||
|
|
||
| ### Response and remediation | ||
|
|
||
| - Immediately isolate the affected system from the network to prevent further unauthorized access or data exfiltration. | ||
| - Terminate the suspicious processes and all associated children and parents. | ||
| - Implement network-level controls to block traffic to the destination.ip. | ||
| - Conduct a thorough review of the system's configuration files to identify unauthorized changes. | ||
| - Reset credentials for any accounts associated with the source machine. | ||
| - Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected. | ||
| """ | ||
|
|
||
| [[rule.threat]] | ||
| framework = "MITRE ATT&CK" | ||
|
|
||
| [rule.threat.tactic] | ||
| id = "TA0011" | ||
| name = "Command and Control" | ||
| reference = "https://attack.mitre.org/tactics/TA0011/" | ||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.