diff --git a/rules/aws/persistence_route_53_domain_transfer_lock_disabled.toml b/rules/aws/persistence_route_53_domain_transfer_lock_disabled.toml new file mode 100644 index 000000000..b1e43ea0d --- /dev/null +++ b/rules/aws/persistence_route_53_domain_transfer_lock_disabled.toml @@ -0,0 +1,63 @@ +[metadata] +creation_date = "2021/05/10" +maturity = "production" +updated_date = "2021/05/10" + +[rule] +author = ["Elastic", "Austin Songer"] +description = """ +Identifies when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this +action unless intending to transfer the domain to a different registrar. +""" +false_positives = [ + """ + A domain transfer lock may be disabled by a system or network administrator. Verify whether the user identity, user + agent, and/or hostname should be making changes in your environment. Activity from unfamiliar users or hosts should + be investigated. If known behavior is causing false positives, it can be exempted from the rule. + """, +] +from = "now-60m" +index = ["filebeat-*", "logs-aws*"] +interval = "10m" +language = "kuery" +license = "Elastic License v2" +name = "AWS Route 53 Domain Transfer Lock Disabled" +note = """## Config + +The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.""" +references = [ + "https://docs.aws.amazon.com/Route53/latest/APIReference/API_Operations_Amazon_Route_53.html", + "https://docs.aws.amazon.com/Route53/latest/APIReference/API_domains_DisableDomainTransferLock.html", +] +risk_score = 21 +rule_id = "12051077-0124-4394-9522-8f4f4db1d674" +severity = "low" +tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility"] +timestamp_override = "event.ingested" +type = "query" + +query = ''' +event.dataset:aws.cloudtrail and event.provider:route53.amazonaws.com and event.action:DisableDomainTransferLock and event.outcome:success +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1098" +name = "Account Manipulation" +reference = "https://attack.mitre.org/techniques/T1098/" + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +id = "TA0006" +name = "Credential Access" +reference = "https://attack.mitre.org/tactics/TA0006/" +