forked from elastic/detection-rules
-
Notifications
You must be signed in to change notification settings - Fork 0
/
ml_rare_destination_country.toml
40 lines (39 loc) · 1.9 KB
/
ml_rare_destination_country.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
[metadata]
creation_date = "2021/04/05"
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
updated_date = "2023/03/06"
[rule]
anomaly_threshold = 75
author = ["Elastic"]
description = """
A machine learning job detected a rare destination country name in the network logs.
This can be due to initial access, persistence, command-and-control, or exfiltration activity.
For example, when a user clicks on a link in a phishing email or opens a malicious document,
a request may be sent to download and run a payload from a server in a country which does not
normally appear in network traffic or business work-flows. Malware instances and persistence
mechanisms may communicate with command-and-control (C2) infrastructure in their country of origin,
which may be an unusual destination country for the source network.
"""
false_positives = [
"""
Business workflows that occur very occasionally, and involve a business relationship with an
organization in a country that does not routinely appear in network events, can trigger this alert.
A new business workflow with an organization in a country with which no workflows previously
existed may trigger this alert - although the model will learn that the new destination country
is no longer anomalous as the activity becomes ongoing. Business travelers who roam to many
countries for brief periods may trigger this alert.
""",
]
from = "now-30m"
interval = "15m"
license = "Elastic License v2"
machine_learning_job_id = "rare_destination_country"
name = "Network Traffic to Rare Destination Country"
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
risk_score = 21
rule_id = "35f86980-1fb1-4dff-b311-3be941549c8d"
severity = "low"
tags = ["Elastic", "Network", "Threat Detection", "ML", "Machine Learning", ]
type = "machine_learning"