IMPORTANT: No additional bug fixes or documentation updates will be released for this version.
Prebuilt rule reference
editPrebuilt rule reference
editThis functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features.
This section lists all available prebuilt rules.
To run machine learning prebuilt rules, you must have the
appropriate license or use a
Cloud deployment. All machine learning prebuilt rules are tagged with ML
,
and their rule type is machine_learning
.
Rule | Description | Tags | Last updated | Version |
---|---|---|---|---|
Adversaries can add the |
[Elastic] [Windows] |
7.7.0 |
||
Detects the creation of an executable file or files that will be automatically run by Acrobat Reader when it starts. |
[Elastic] [Windows] |
7.6.2 |
||
Elastic Endpoint detected an Adversary Behavior. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Searches for rare processes running on multiple Linux hosts in an entire fleet or network. This reduces the detection of false positives since automated maintenance processes usually only run occasionally on a single machine but are common to all or many hosts in a fleet. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Searches for rare processes running on multiple hosts in an entire fleet or network. This reduces the detection of false positives since automated maintenance processes usually only run occasionally on a single machine but are common to all or many hosts in a fleet. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Identifies unusual parent-child process relationships that can indicate malware execution or persistence mechanisms. Malicious scripts often call on other applications and processes as part of their exploit payload. For example, when a malicious Office document runs scripts as part of an exploit payload, Excel or Word may start a script interpreter process, which, in turn, runs a script that downloads and executes malware. Another common scenario is Outlook running an unusual process when malware is downloaded in an email. Monitoring and identifying anomalous process relationships is a method of detecting new and emerging malware that is not yet recognized by anti-virus scanners. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Adversaries may attempt to disable the iptables or firewall service in an attempt to affect how a host is allowed to receive or send network traffic. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Adversaries may attempt to disable the syslog service in an attempt to an attempt to disrupt event logging and evade detection by security controls. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Adversaries may encode/decode data in an attempt to evade detection by host- or network-based security controls. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Adversaries may encode/decode data in an attempt to evade detection by host- or network-based security controls. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Identifies User Account Control (UAC) bypass via |
[Elastic] [Windows] |
7.7.0 |
1 |
|
Identifies attempts to clear Windows event log stores. This is often done by attackers in an attempt to evade detection or destroy forensic evidence on a system. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies |
[Elastic] [Windows] |
7.7.0 |
||
Telnet provides a command line interface for communication with a remote device or server. This rule identifies Telnet network connections to publicly routable IP addresses. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Telnet provides a command line interface for communication with a remote device or server. This rule identifies Telnet network connections to non-publicly routable IP addresses. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Elastic Endpoint detected Credential Dumping. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Credential Dumping. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint detected Credential Manipulation. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Credential Manipulation. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Detects when an internal network client sends DNS traffic directly to the Internet. This is atypical behavior for a managed network, and can be indicative of malware, exfiltration, command and control, or, simply, misconfiguration. This DNS activity also impacts your organization’s ability to provide enterprise monitoring and logging of DNS, and opens your network to a variety of abuses and malicious communications. |
[Elastic] [Network] |
7.7.0 |
||
Detects unusually large numbers of DNS queries for a single top-level DNS domain, which is often used for DNS tunneling. DNS tunneling can be used for command-and-control, persistence, or data exfiltration activity. For example, |
[Elastic] [ML] [Packetbeat] |
7.7.0 |
1 |
|
Identifies use of the |
[Elastic] [Windows] |
7.7.0 |
||
Identifies use of the |
[Elastic] [Windows] |
7.7.0 |
||
Identifies unexpected processes making network connections over port 445. Windows File Sharing is typically implemented over Server Message Block (SMB), which communicates between hosts using port 445. When legitimate, these network connections are established by the kernel. Processes making 445/tcp connections may be port scanners, exploits, or suspicious user-level processes moving laterally. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies use of the |
[Elastic] [Windows] |
7.7.0 |
||
Identifies the use of |
[Elastic] [Windows] |
7.7.0 |
||
Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. This identifies attempts to enumerate information about a kernel module. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
|
[Elastic] [Windows] |
7.7.0 |
1 |
|
Elastic Endpoint detected an Exploit. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented an Exploit. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Detects events that may indicate the use of FTP network connections to the Internet. The File Transfer Protocol (FTP) has been around in its current form since the 1980s. It can be a common and efficient procedure on your network to send and receive files. Because of this, adversaries will also often use this protocol to exfiltrate data from your network or download new tools. Additionally, FTP is a plain-text protocol which, if intercepted, may expose usernames and passwords. FTP activity involving servers subject to regulations or compliance standards may be unauthorized. |
[Elastic] [Network] |
7.7.0 |
||
Malware or other files dropped or created on a system by an adversary may leave traces behind as to what was done within a network and how. Adversaries may remove these files over the course of an intrusion to keep their footprint low or remove them at the end as part of the post-intrusion cleanup process. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Identifies file permission modifications in common writable directories by a non-root user. Adversaries often drop files or payloads into a writable directory and change permissions prior to execution. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Adversaries may encode/decode data in an attempt to evade detection by host- or network-based security controls. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Hping ran on a Linux host. Hping is a FOSS command-line packet analyzer and has the ability to construct network packets for a wide variety of network security testing applications, including scanning and firewall auditing. |
[Elastic] [Linux] |
7.7.0 |
||
Detects events that could be describing IPSEC NAT Traversal traffic. IPSEC is a VPN technology that allows one system to talk to another using encrypted tunnels. NAT Traversal enables these tunnels to communicate over the Internet where one of the sides is behind a NAT router gateway. This may be common on your network, but this technique is also used by threat actors to avoid detection. |
[Elastic] [Network] |
7.6.1 |
||
Detects events that use common ports for Internet Relay Chat (IRC) to the Internet. IRC is a common protocol that can be used for chat and file transfers. This protocol is also a good candidate for remote control of malware and data transfers to and from a network. |
[Elastic] [Network] |
7.7.0 |
||
Identifies when a terminal (tty) is spawned via Perl. Attackers may upgrade a simple reverse shell to a fully interactive tty after obtaining initial access to a host. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Identifies when a terminal (tty) is spawned via Python. Attackers may upgrade a simple reverse shell to a fully interactive tty after obtaining initial access to a host. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Kernel modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. This rule identifies attempts to remove a kernel module. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
A scheduled task can be used by an adversary to establish persistence, move laterally, and/or escalate privileges. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies use of |
[Elastic] [Windows] |
7.7.0 |
||
Elastic Endpoint detected Malware. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Malware. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
An instance of MSBuild, the Microsoft Build Engine, loaded DLLs (dynamically linked libraries) responsible for Windows credential management. This technique is sometimes used for credential dumping. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
An instance of MSBuild, the Microsoft Build Engine, started a PowerShell script or the Visual C# Command Line Compiler. This technique is sometimes used to deploy a malicious payload using the Build Engine. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
An instance of MSBuild, the Microsoft Build Engine, was started by a script or the Windows command interpreter. This behavior is unusual and is sometimes used by malicious payloads. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
An instance of MSBuild, the Microsoft Build Engine, was started by Explorer or the WMI (Windows Management Instrumentation) subsystem. This behavior is unusual and is sometimes used by malicious payloads. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
An instance of MSBuild, the Microsoft Build Engine, was started by Excel or Word. This is unusual behavior for the Build Engine and could have been caused by an Excel or Word document executing a malicious script payload. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
An instance of MSBuild, the Microsoft Build Engine, was started after being renamed. This is uncommon behavior and may indicate an attempt to run MSBuild unnoticed or undetected. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
The Linux |
[Elastic] [Linux] |
7.7.0 |
||
Identifies use of |
[Elastic] [Windows] |
7.7.0 |
1 |
|
Identifies |
[Elastic] [Windows] |
7.7.0 |
||
Identifies the SYSTEM account using the Net utility. The Net utility is a component of the Windows operating system. It is used in command line operations for control of users, groups, services, and network connections. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
A |
[Elastic] [Linux] |
7.7.0 |
||
Identifies |
[Elastic] [Windows] |
7.7.0 |
1 |
|
Compiled HTML files ( |
[Elastic] [Windows] |
7.7.0 |
||
Identifies |
[Elastic] [Windows] |
7.7.0 |
1 |
|
Identifies |
[Elastic] [Windows] |
7.7.0 |
||
Identifies the native Windows tools |
[Elastic] [Windows] |
7.7.0 |
||
Binaries signed with trusted digital certificates can execute on Windows systems protected by digital signature validation. Adversaries may use these binaries to live off the land and execute malicious files that could bypass application allowlists and signature validation. |
[Elastic] [Windows] |
7.7.0 |
||
The Tcpdump program ran on a Linux host. Tcpdump is a network monitoring or packet sniffing tool that can be used to capture insecure credentials or data in motion. Sniffing can also be used to discover details of network services as a prelude to lateral movement or defense evasion. |
[Elastic] [Linux] |
7.7.0 |
||
Nmap was executed on a Linux host. Nmap is a FOSS tool for network scanning and security testing. It can map and discover networks, and identify listening services and operating systems. It is sometimes used to gather information in support of exploitation, execution or lateral movement. |
[Elastic] [Linux] |
7.7.0 |
||
Nping ran on a Linux host. Nping is part of the Nmap tool suite and has the ability to construct raw packets for a wide variety of security testing applications, including denial of service testing. |
[Elastic] [Linux] |
7.7.0 |
||
Detects events that may indicate use of a PPTP VPN connection. Some threat actors use these types of connections to tunnel their traffic while avoiding detection. |
[Elastic] [Network] |
7.6.1 |
||
Elastic Endpoint detected Permission Theft. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Permission Theft. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Identifies loadable kernel module errors, which are often indicative of potential persistence attempts. |
[Elastic] [Linux] |
7.7.0 |
||
The Application Shim was created to allow for backward compatibility of software as the operating system codebase changes over time. This Windows functionality has been abused by attackers to stealthily gain persistence and arbitrary code execution in legitimate Windows processes. |
[Elastic] [Windows] |
7.7.0 |
||
Iodine is a tool for tunneling Internet protocol version 4 (IPV4) traffic over the DNS protocol to circumvent firewalls, network security groups, and network access lists while evading detection. |
[Elastic] [Linux] |
7.7.0 |
||
Identifies potential attempts to disable Security-Enhanced Linux (SELinux), which is a Linux kernel security feature to support access control policies. Adversaries may disable security tools to avoid possible detection of their tools and activities. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
The Filter Manager Control Program (fltMC.exe) binary may be abused by adversaries to unload a filter driver and evade defenses. |
[Elastic] [Windows] |
7.7.0 |
||
Windows contains accessibility features that may be launched with a key combination before a user has logged in. An adversary can modify the way these programs are launched to get a command prompt or backdoor without logging in to the system. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies suspicious commands executed via a web server, which may suggest a vulnerability and remote shell access. |
[Elastic] [Linux] |
7.8.0 |
||
Identifies a suspicious parent child process relationship with |
[Elastic] [Windows] |
7.7.0 |
||
Compiled HTML files ( |
[Elastic] [Windows] |
7.7.0 |
||
Adversaries may attempt to get information about running processes on a system. |
[Elastic] [Windows] |
7.7.0 |
||
Elastic Endpoint detected Process Injection. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Process Injection. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
An instance of MSBuild, the Microsoft Build Engine, created a thread in another process. This technique is sometimes used to evade detection or elevate privileges. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
Detects events that may describe network events of proxy use to the Internet. It includes popular HTTP proxy ports and SOCKS proxy ports. Typically, environments will use an internal IP address for a proxy server. It can also be used to circumvent network controls and detection mechanisms. |
[Elastic] [Network] |
7.7.0 |
||
Identifies use of the SysInternals tool |
[Elastic] [Windows] |
7.7.0 |
||
Detects network events that may indicate the use of RDP traffic from the Internet. RDP is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of RDP traffic to the Internet. RDP is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of RPC traffic from the Internet. RPC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of RPC traffic to the Internet. RPC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Elastic Endpoint detected Ransomware. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Elastic Endpoint prevented Ransomware. Click the Elastic Endpoint icon in the |
[Elastic] [Endpoint] |
7.7.0 |
||
Detects network events that may indicate the use of Windows file sharing (also called SMB or CIFS) traffic to the Internet. SMB is commonly used within networks to share files, printers, and other system resources amongst trusted systems. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back- door vector or for data exfiltration. |
[Elastic] [Network] |
7.7.0 |
||
Detects events that may indicate use of SMTP on TCP port 26. This port is commonly used by several popular mail transfer agents to deconflict with the default SMTP port 25. This port has also been used by a malware family called BadPatch for command and control of Windows systems. |
[Elastic] [Network] |
7.6.1 |
||
Detects events that may describe SMTP traffic from internal hosts to a host across the Internet. In an enterprise network, there is typically a dedicated internal host that performs this function. It is also frequently abused by threat actors for command and control, or data exfiltration. |
[Elastic] [Network] |
7.7.0 |
||
Detects events that may describe database traffic (MS SQL, Oracle, MySQL, and Postgresql) across the Internet. Databases should almost never be directly exposed to the Internet, as they are frequently targeted by threat actors to gain initial access to network resources. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of SSH traffic from the Internet. SSH is commonly used by system administrators to remotely control a system using the command line shell. If it is exposed to the Internet, it should be done with strong security controls as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of SSH traffic to the Internet. SSH is commonly used by system administrators to remotely control a system using the command line shell. If it is exposed to the Internet, it should be done with strong security controls as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
An adversary may add the setgid bit to a file or directory in order to run a file with the privileges of the owning group. An adversary can take advantage of this to either do a shell escape or exploit a vulnerability in an application with the setgid bit to get code running in a different user’s context. Additionally, adversaries can use this mechanism on their own malware to make sure they’re able to execute in elevated contexts in the future. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
An adversary may add the setuid bit to a file or directory in order to run a file with the privileges of the owning user. An adversary can take advantage of this to either do a shell escape or exploit a vulnerability in an application with the setuid bit to get code running in a different user’s context. Additionally, adversaries can use this mechanism on their own malware to make sure they’re able to execute in elevated contexts in the future. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
A Socat process is running on a Linux host. Socat is often used as a persistence mechanism by exporting a reverse shell, or by serving a shell on a listening port. Socat is also sometimes used for lateral movement. |
[Elastic] [Linux] |
7.7.0 |
||
Strace runs in a privileged context and can be used to escape restrictive environments by instantiating a shell in order to elevate privileges or move laterally. |
[Elastic] [Linux] |
7.7.0 |
||
A sudoers file specifies the commands that users or groups can run and from which terminals. Adversaries can take advantage of these configurations to execute commands as other users or spawn processes with higher privileges. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Identifies suspicious child processes of frequently targeted Microsoft Office applications (Word, PowerPoint, Excel). These child processes are often launched during exploitation of Office applications or from documents with malicious macros. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies suspicious child processes of Microsoft Outlook. These child processes are often associated with spear phishing activity. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies suspicious child processes of PDF reader applications. These child processes are often launched via exploitation of PDF applications or social engineering. |
[Elastic] [Windows] |
7.7.0 |
1 |
|
A machine learning job detected a PowerShell script with unusual data characteristics, such as obfuscation, that may be a characteristic of malicious PowerShell script text blocks. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Identifies a suspicious parent-child process relationship with cmd.exe descending from |
[Elastic] [Windows] |
7.7.0 |
||
Windows services typically run as SYSTEM and can be used as a privilege escalation opportunity. Malware or penetration testers may run a shell as a service to gain SYSTEM permissions. |
[Elastic] [Windows] |
7.7.0 |
||
TCP Port 8000 is commonly used for development environments of web server software. It generally should not be exposed directly to the Internet. If you are running software like this on the Internet, you should consider placing it behind a reverse proxy. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of Telnet traffic. Telnet is commonly used by system administrators to remotely control older or embedded systems using the command line shell. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. As a plain-text protocol, it may also expose usernames and passwords to anyone capable of observing the traffic. |
[Elastic] [Network] |
7.6.1 |
||
Detects network events that may indicate the use of Tor traffic to the Internet. Tor is a network protocol that sends traffic through a series of encrypted tunnels used to conceal a user’s location and usage. Tor may be used by threat actors as an alternate communication pathway to conceal the actor’s identity and avoid detection. |
[Elastic] [Network] |
7.7.0 |
||
Identifies possibly suspicious activity using a trusted Windows developer utility program. |
[Elastic] [Windows] |
7.7.0 |
||
A machine learning job detected a rare and unusual DNS query that indicates network activity with unusual DNS domains. This can be due to initial access, persistence, command-and-control, or exfiltration activity. For example, when a user clicks on a link in a phishing email or opens a malicious document, a request may be sent to download and run a payload from an uncommon domain. When malware is already running, it may send requests to an uncommon DNS domain the malware uses for command-and-control communication. |
[Elastic] [ML] [Packetbeat] |
7.7.0 |
1 |
|
Identifies Linux processes that do not usually use the network but have unexpected network activity, which can indicate command-and-control, lateral movement, persistence, or data exfiltration activity. A process with unusual network activity can denote process exploitation or injection, where the process is used to run persistence mechanisms that allow a malicious actor remote access or control of the host, data exfiltration, and execution of unauthorized network applications. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Identifies unusual destination port activity that can indicate command-and- control, persistence mechanism, or data exfiltration activity. Rarely used destination port activity is generally unusual in Linux fleets, and can indicate unauthorized access or threat actor activity. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Identifies unusual listening ports on Linux instances that can indicate execution of unauthorized services, backdoors, or persistence mechanisms. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
A machine learning job detected activity for a username that is not normally active, which can indicate unauthorized changes, activity by unauthorized users, lateral movement, or compromised credentials. In many organizations, new usernames are not often created apart from specific types of system activities, such as creating new accounts for new employees. These user accounts quickly become active and routine. Events from rarely used usernames can point to suspicious activity. Additionally, automated Linux fleets tend to see activity from rarely used usernames only when personnel log in to make authorized or unauthorized changes, or threat actors have acquired credentials and log in for malicious purposes. Unusual usernames can also indicate pivoting, where compromised credentials are used to try and move laterally from one host to another. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
A machine learning job detected an unusual web URL request from a Linux host, which can indicate malware delivery and execution. Wget and cURL are commonly used by Linux programs to download code and data. Most of the time, their usage is entirely normal. Generally, because they use a list of URLs, they repeatedly download from the same locations. However, Wget and cURL are sometimes used to deliver Linux exploit payloads, and threat actors use these tools to download additional software and code. For these reasons, unusual URLs can indicate unauthorized downloads or threat activity. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Identifies an unusually high number of authentication attempts. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Identifies unusual instances of |
[Elastic] [Windows] |
7.8.0 |
||
A machine learning job detected an unusual network destination domain name. This can be due to initial access, persistence, command-and-control, or exfiltration activity. For example, when a user clicks on a link in a phishing email or opens a malicious document, a request may be sent to download and run a payload from an uncommon web server name. When malware is already running, it may send requests to an uncommon DNS domain the malware uses for command-and-control communication. |
[Elastic] [ML] [Packetbeat] |
7.7.0 |
1 |
|
Identifies Windows programs run from unexpected parent processes. This could indicate masquerading or other strange activity on a system. |
[Elastic] [Windows] |
7.7.0 |
||
Identifies processes running in a temporary folder. This is sometimes done by adversaries to hide malware. |
[Elastic] [Linux] |
7.7.0 |
||
Identifies rare processes that do not usually run on individual hosts, which can indicate execution of unauthorized services, malware, or persistence mechanisms. Processes are considered rare when they only run occasionally as compared with other processes running on the host. |
[Elastic] [Linux] [ML] |
7.7.0 |
1 |
|
Identifies rare processes that do not usually run on individual hosts, which can indicate execution of unauthorized services, malware, or persistence mechanisms. Processes are considered rare when they only run occasionally as compared with other processes running on the host. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Identifies network activity from unexpected system applications. This may indicate adversarial activity as these applications are often leveraged by adversaries to execute code and evade detection. |
[Elastic] [Windows] |
7.7.0 |
||
A machine learning job detected a rare and unusual URL that indicates unusual web browsing activity. This can be due to initial access, persistence, command- and-control, or exfiltration activity. For example, in a strategic web compromise or watering hole attack, when a trusted website is compromised to target a particular sector or organization, targeted users may receive emails with uncommon URLs for trusted websites. These URLs can be used to download and run a payload. When malware is already running, it may send requests to uncommon URLs on trusted websites the malware uses for command-and-control communication. When rare URLs are observed being requested for a local web server by a remote source, these can be due to web scanning, enumeration or attack traffic, or they can be due to bots and web scrapers which are part of common Internet background traffic. |
[Elastic] [ML] [Packetbeat] |
7.7.0 |
1 |
|
A machine learning job detected a rare and unusual user agent indicating web browsing activity by an unusual process other than a web browser. This can be due to persistence, command-and-control, or exfiltration activity. Uncommon user agents coming from remote sources to local destinations are often the result of scanners, bots, and web scrapers, which are part of common Internet background traffic. Much of this is noise, but more targeted attacks on websites using tools like Burp or SQLmap can sometimes be discovered by spotting uncommon user agents. Uncommon user agents in traffic from local sources to remote destinations can be any number of things, including harmless programs like weather monitoring or stock-trading programs. However, uncommon user agents from local sources can also be due to malware or scanning activity. |
[Elastic] [ML] [Packetbeat] |
7.7.0 |
1 |
|
Identifies Windows processes that do not usually use the network but have unexpected network activity, which can indicate command-and-control, lateral movement, persistence, or data exfiltration activity. A process with unusual network activity can denote process exploitation or injection, where the process is used to run persistence mechanisms that allow a malicious actor remote access or control of the host, data exfiltration, and execution of unauthorized network applications. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Identifies processes started from atypical folders in the file system, which may indicate malware execution or persistence mechanisms. In corporate Windows environments, software installation is centrally managed and it is unusual for programs to be executed from user or temporary directories. Processes executed from these locations can denote that a user downloaded software directly from the Internet or a malicious script or macro executed malware. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
A machine learning job detected an unusual remote desktop protocol (RDP) username, which can indicate account takeover or credentialed persistence using compromised accounts. RDP attacks, such as BlueKeep, also tend to use unusual usernames. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
A machine learning job detected an unusual Windows service, This can indicate execution of unauthorized services, malware, or persistence mechanisms. In corporate Windows environments, hosts do not generally run many rare or unique services. This job helps detect malware and persistence mechanisms that have been installed and run as a service. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
A machine learning job detected an unusual user context switch, using the |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
A machine learning job detected activity for a username that is not normally active, which can indicate unauthorized changes, activity by unauthorized users, lateral movement, or compromised credentials. In many organizations, new usernames are not often created apart from specific types of system activities, such as creating new accounts for new employees. These user accounts quickly become active and routine. Events from rarely used usernames can point to suspicious activity. Unusual usernames can also indicate pivoting, where compromised credentials are used to try and move laterally from one host to another. |
[Elastic] [ML] [Windows] |
7.7.0 |
1 |
|
Identifies attempts to create new local users. This is sometimes done by attackers to increase access to a system or domain. |
[Elastic] [Windows] |
7.7.0 |
||
The |
[Elastic] [Linux] |
7.7.0 |
||
Detects network events that may indicate the use of VNC traffic from the Internet. VNC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
Detects network events that may indicate the use of VNC traffic to the Internet. VNC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector. |
[Elastic] [Network] |
7.7.0 |
||
An adversary may attempt to get detailed information about the operating system and hardware. This rule identifies common locations used to discover virtual machine hardware by a non-root user. This technique has been used by the Pupy RAT and other malware. |
[Elastic] [Linux] |
7.8.0 |
1 |
|
Identifies use of |
[Elastic] [Windows] |
7.7.0 |
||
Identifies use of |
[Elastic] [Windows] |
7.7.0 |
||
A request to a web application server contained no identifying user agent string. |
[APM] [Elastic] |
7.7.0 |
||
A POST request to web application returned a 403 response, which indicates the web application declined to process the request because the action requested was not allowed. |
[APM] [Elastic] |
7.7.0 |
||
A request to web application returned a 405 response which indicates the web application declined to process the request because the HTTP method is not allowed for the resource. |
[APM] [Elastic] |
7.7.0 |
||
This is an example of how to detect an unwanted web client user agent. This search matches the user agent for sqlmap 1.3.11, which is a popular FOSS tool for testing web applications for SQL injection vulnerabilities. |
[APM] [Elastic] |
7.7.0 |
||
Identifies use of |
[Elastic] [Windows] |
7.7.0 |
||
Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) |
A spoofing vulnerability exists in the way Windows CryptoAPI ( |
[Elastic] [Windows] |
7.7.0 |
1 |
Identifies a PowerShell process launched by either |
[Elastic] [Windows] |
7.7.0 |