Skip to content

Commit f8f6430

Browse files
[Rule tuning] Revise rule description and other text (elastic#1398)
1 parent d236578 commit f8f6430

File tree

40 files changed

+68
-69
lines changed

40 files changed

+68
-69
lines changed

rules/apm/apm_403_response_to_a_post.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated_date = "2021/07/13"
66
[rule]
77
author = ["Elastic"]
88
description = """
9-
A POST request to web application returned a 403 response, which indicates the web application declined to process the
9+
A POST request to a web application returned a 403 response, which indicates the web application declined to process the
1010
request because the action requested was not allowed.
1111
"""
1212
false_positives = [

rules/apm/apm_405_response_method_not_allowed.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ updated_date = "2021/07/13"
66
[rule]
77
author = ["Elastic"]
88
description = """
9-
A request to web application returned a 405 response which indicates the web application declined to process the request
10-
because the HTTP method is not allowed for the resource.
9+
A request to a web application returned a 405 response, which indicates the web application declined to process the
10+
request because the HTTP method is not allowed for the resource.
1111
"""
1212
false_positives = [
1313
"""

rules/integrations/aws/exfiltration_ec2_full_network_packet_capture_detected.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ integration = "aws"
88
author = ["Elastic", "Austin Songer"]
99
description = """
1010
Identifies potential Traffic Mirroring in an Amazon Elastic Compute Cloud (EC2) instance. Traffic Mirroring is an Amazon
11-
VPC feature that you can use to copy network traffic from an elastic network interface. This feature can potentially be
11+
VPC feature that you can use to copy network traffic from an Elastic network interface. This feature can potentially be
1212
abused to exfiltrate sensitive data from unencrypted internal traffic.
1313
"""
1414
false_positives = [

rules/integrations/aws/impact_rds_group_deletion.toml

+3-4
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ integration = "aws"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
9-
description = "Identifies the deletion of an Amazon Relational Database Service (RDS) Security Group."
9+
description = "Identifies the deletion of an Amazon Relational Database Service (RDS) Security group."
1010
false_positives = [
1111
"""
12-
A RDS security group deletion may be done by a system or network administrator. Verify whether the user identity,
13-
user agent, and/or hostname should be making changes in your environment. Security Group deletions from unfamiliar
12+
An RDS security group deletion may be done by a system or network administrator. Verify whether the user identity,
13+
user agent, and/or hostname should be making changes in your environment. Security group deletions from unfamiliar
1414
users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the
1515
rule.
1616
""",
@@ -49,4 +49,3 @@ reference = "https://attack.mitre.org/techniques/T1531/"
4949
id = "TA0040"
5050
name = "Impact"
5151
reference = "https://attack.mitre.org/tactics/TA0040/"
52-

rules/integrations/aws/ml_cloudtrail_error_message_spike.toml

+4-4
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ The AWS Fleet integration, Filebeat module, or similarly structured data is requ
3232
3333
### Investigating Spikes in CloudTrail Errors
3434
Detection alerts from this rule indicate a large spike in the number of CloudTrail log messages that contain a particular error message. The error message in question was associated with the response to an AWS API command or method call. Here are some possible avenues of investigation:
35-
- Examine the history of the error. Has it manifested before? If the error, which is visible in the `aws.cloudtrail.error_message` field, manifested only very recently, it might be related to recent changes in an automation module or script.
36-
- Examine the request parameters. These may provide indications as to the nature of the task being performed when the error occurred. Is the error related to unsuccessful attempts to enumerate or access objects, data or secrets? If so, this can sometimes be a byproduct of discovery, privilege escalation or lateral movement attempts.
37-
- Consider the user as identified by the user.name field. Is this activity part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
38-
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?"""
35+
- Examine the history of the error. Has it manifested before? If the error, which is visible in the `aws.cloudtrail.error_message` field, only manifested recently, it might be related to recent changes in an automation module or script.
36+
- Examine the request parameters. These may provide indications as to the nature of the task being performed when the error occurred. Is the error related to unsuccessful attempts to enumerate or access objects, data, or secrets? If so, this can sometimes be a byproduct of discovery, privilege escalation or lateral movement attempts.
37+
- Consider the user as identified by the user.name field. Is this activity part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field, which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
38+
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts, or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?"""
3939
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
4040
risk_score = 21
4141
rule_id = "78d3d8d9-b476-451d-a9e0-7a5addd70670"

rules/integrations/aws/ml_cloudtrail_rare_error_code.toml

+3-3
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ The AWS Fleet integration, Filebeat module, or similarly structured data is requ
3232
3333
Investigating Unusual CloudTrail Error Activity ###
3434
Detection alerts from this rule indicate a rare and unusual error code that was associated with the response to an AWS API command or method call. Here are some possible avenues of investigation:
35-
- Examine the history of the error. Has it manifested before? If the error, which is visible in the `aws.cloudtrail.error_code field`, manifested only very recently, it might be related to recent changes in an automation module or script.
35+
- Examine the history of the error. Has it manifested before? If the error, which is visible in the `aws.cloudtrail.error_code field`, only manifested recently, it might be related to recent changes in an automation module or script.
3636
- Examine the request parameters. These may provide indications as to the nature of the task being performed when the error occurred. Is the error related to unsuccessful attempts to enumerate or access objects, data, or secrets? If so, this can sometimes be a byproduct of discovery, privilege escalation, or lateral movement attempts.
37-
- Consider the user as identified by the `user.name` field. Is this activity part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
38-
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?"""
37+
- Consider the user as identified by the `user.name` field. Is this activity part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field, which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
38+
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts, or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?"""
3939
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
4040
risk_score = 21
4141
rule_id = "19de8096-e2b0-4bd8-80c9-34a820813fff"

rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml

+4-4
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ author = ["Elastic"]
1010
description = """
1111
A machine learning job detected AWS command activity that, while not inherently suspicious or abnormal, is sourcing from
1212
a geolocation (city) that is unusual for the command. This can be the result of compromised credentials or keys being
13-
used by a threat actor in a different geography then the authorized user(s).
13+
used by a threat actor in a different geography than the authorized user(s).
1414
"""
1515
false_positives = [
1616
"""
@@ -33,10 +33,10 @@ The AWS Fleet integration, Filebeat module, or similarly structured data is requ
3333
3434
### Investigating an Unusual CloudTrail Event
3535
Detection alerts from this rule indicate an AWS API command or method call that is rare and unusual for the geolocation of the source IP address. Here are some possible avenues of investigation:
36-
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?
37-
- Consider the user as identified by the `user.name` field. Is this command part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
36+
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts, or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?
37+
- Consider the user as identified by the `user.name` field. Is this command part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field, which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
3838
- Consider the time of day. If the user is a human, not a program or script, did the activity take place during a normal time of day?
39-
- Examine the history of the command. If the command, which is visible in the `event.action field`, manifested only very recently, it might be part of a new automation module or script. If it has a consistent cadence - for example, if it appears in small numbers on a weekly or monthly cadence it might be part of a housekeeping or maintenance process.
39+
- Examine the history of the command. If the command, which is visible in the `event.action field`, only manifested recently, it might be part of a new automation module or script. If it has a consistent cadence (for example, if it appears in small numbers on a weekly or monthly cadence), it might be part of a housekeeping or maintenance process.
4040
- Examine the request parameters. These may provide indications as to the source of the program or the nature of the tasks it is performing."""
4141
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
4242
risk_score = 21

rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml

+4-4
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ author = ["Elastic"]
1010
description = """
1111
A machine learning job detected AWS command activity that, while not inherently suspicious or abnormal, is sourcing from
1212
a geolocation (country) that is unusual for the command. This can be the result of compromised credentials or keys being
13-
used by a threat actor in a different geography then the authorized user(s).
13+
used by a threat actor in a different geography than the authorized user(s).
1414
"""
1515
false_positives = [
1616
"""
@@ -33,10 +33,10 @@ The AWS Fleet integration, Filebeat module, or similarly structured data is requ
3333
3434
### Investigating an Unusual CloudTrail Event
3535
Detection alerts from this rule indicate an AWS API command or method call that is rare and unusual for the geolocation of the source IP address. Here are some possible avenues of investigation:
36-
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?
37-
- Consider the user as identified by the `user.name` field. Is this command part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
36+
- Consider the source IP address and geolocation for the calling user who issued the command. Do they look normal for the calling user? If the source is an EC2 IP address, is it associated with an EC2 instance in one of your accounts, or could it be sourcing from an EC2 instance not under your control? If it is an authorized EC2 instance, is the activity associated with normal behavior for the instance role or roles? Are there any other alerts or signs of suspicious activity involving this instance?
37+
- Consider the user as identified by the `user.name` field. Is this command part of an expected workflow for the user context? Examine the user identity in the `aws.cloudtrail.user_identity.arn` field and the access key id in the `aws.cloudtrail.user_identity.access_key_id` field, which can help identify the precise user context. The user agent details in the `user_agent.original` field may also indicate what kind of a client made the request.
3838
- Consider the time of day. If the user is a human, not a program or script, did the activity take place during a normal time of day?
39-
- Examine the history of the command. If the command, which is visible in the `event.action field`, manifested only very recently, it might be part of a new automation module or script. If it has a consistent cadence - for example, if it appears in small numbers on a weekly or monthly cadence it might be part of a housekeeping or maintenance process.
39+
- Examine the history of the command. If the command, which is visible in the `event.action field`, only manifested recently, it might be part of a new automation module or script. If it has a consistent cadence (for example, if it appears in small numbers on a weekly or monthly cadence), it might be part of a housekeeping or maintenance process.
4040
- Examine the request parameters. These may provide indications as to the source of the program or the nature of the tasks it is performing."""
4141
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
4242
risk_score = 21

0 commit comments

Comments
 (0)