-
Notifications
You must be signed in to change notification settings - Fork 611
[New] PANW Command and Control Correlation #5331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
+76
−0
Merged
Changes from 1 commit
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
a324306
[New] PANW Command and Control Correlation
Samirbous ec6ede8
Update rules/cross-platform/command_and_control_pan_elastic_defend_c2…
Samirbous 8371587
Merge branch 'main' into pan-c2-endpoint
Samirbous b3a4ab3
Update rules/cross-platform/command_and_control_pan_elastic_defend_c2…
Samirbous a3fcf29
Update rules/cross-platform/command_and_control_pan_elastic_defend_c2…
Samirbous 41c2327
Update rules/cross-platform/command_and_control_pan_elastic_defend_c2…
Samirbous 3d6279c
Update command_and_control_pan_elastic_defend_c2.toml
Samirbous affef1b
Update command_and_control_pan_elastic_defend_c2.toml
Samirbous 5d4fd52
Merge branch 'main' into pan-c2-endpoint
Samirbous File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
75 changes: 75 additions & 0 deletions
75
rules/cross-platform/command_and_control_pan_elastic_defend_c2.toml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,75 @@ | ||
| [metadata] | ||
| creation_date = "2025/11/18" | ||
| integration = ["endpoint", "panw"] | ||
| maturity = "production" | ||
| updated_date = "2025/11/18" | ||
|
|
||
| [rule] | ||
| author = ["Elastic"] | ||
| description = """ | ||
| This detection correlates Palo Alto Networks (PANW) command and control events with Elastic Defend network events to identify | ||
| the source process performing the network activity. | ||
| """ | ||
| from = "now-9m" | ||
| index = ["logs-endpoint.events.network-default*", "logs-panw.panos-default-*"] | ||
| language = "eql" | ||
| license = "Elastic License v2" | ||
| name = "PANW Command and Control Correlation" | ||
Samirbous marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| references = [ | ||
| "https://attack.mitre.org/tactics/TA0011/", | ||
| "https://www.elastic.co/docs/reference/integrations/fortinet_fortigate", | ||
Samirbous marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| "https://www.elastic.co/docs/reference/integrations/endpoint" | ||
| ] | ||
| risk_score = 47 | ||
| rule_id = "da4f56b8-9bc5-4003-a46c-d23616fbc691" | ||
| severity = "medium" | ||
| tags = [ | ||
| "Domain: Endpoint", | ||
| "OS: Linux", | ||
| "OS: Windows", | ||
| "OS: macOS", | ||
| "Use Case: Threat Detection", | ||
| "Tactic: Command and Control", | ||
| "Data Source: Elastic Defend", | ||
| "Data Source: PAN-OS", | ||
| "Resources: Investigation Guide", | ||
| ] | ||
| type = "eql" | ||
| query = ''' | ||
| sequence by source.port, source.ip, destination.ip with maxspan=1m | ||
| [network where event.module == "panw" and event.action == "c2_communication"] | ||
| [network where event.module == "endpoint" and event.action in ("disconnect_received", "connection_attempted")] | ||
| ''' | ||
| note = """## Triage and analysis | ||
|
|
||
| ### Investigating PANW Command and Control Correlation | ||
|
|
||
| ### Possible investigation steps | ||
|
|
||
| - Review the process details like command_line, privileges, global relevance and reputation. | ||
Samirbous marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| - Assess the destination.ip reputation and global relevance. | ||
| - Review the parent process execution details like command_line, global relevance and reputation. | ||
| - Examine all network connection details performed by the process during last 48h. | ||
| - Correlate the alert with other security events or logs to identify any patterns or additional indicators of compromise related to the same process or network activity. | ||
|
|
||
| ### False positive analysis | ||
|
|
||
| - Trusted system or third party processes performing network activity that looks like beaconing. | ||
|
|
||
| ### Response and remediation | ||
|
|
||
| - Immediately isolate the affected system from the network to prevent further unauthorized access or data exfiltration. | ||
| - Terminate the suspicious processes and all associated children and parents. | ||
| - Implement network-level controls to block traffic to the destination.ip. | ||
| - Conduct a thorough review of the system's configuration files to identify unauthorized changes. | ||
| - Reset credentials for any accounts associated with the source machine. | ||
| - Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected. | ||
| """ | ||
|
|
||
| [[rule.threat]] | ||
| framework = "MITRE ATT&CK" | ||
|
|
||
| [rule.threat.tactic] | ||
| id = "TA0011" | ||
| name = "Command and Control" | ||
| reference = "https://attack.mitre.org/tactics/TA0011/" | ||
Samirbous marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.