From cae5fee0252fb59e58ab6c56ef2f8aed1bc64ea8 Mon Sep 17 00:00:00 2001 From: seth-goodwin <58222969+seth-goodwin@users.noreply.github.com> Date: Tue, 7 Jul 2020 09:37:17 -0700 Subject: [PATCH] [New Rule] Add AWS Password Recovery Requested --- .../aws/initial_access_password_recovery.toml | 50 +++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 rules/aws/initial_access_password_recovery.toml diff --git a/rules/aws/initial_access_password_recovery.toml b/rules/aws/initial_access_password_recovery.toml new file mode 100644 index 000000000..73034fc82 --- /dev/null +++ b/rules/aws/initial_access_password_recovery.toml @@ -0,0 +1,50 @@ +[metadata] +creation_date = "2020/07/02" +ecs_version = ["1.5.0"] +maturity = "production" +updated_date = "2020/07/02" + +[rule] +author = ["Elastic"] +description = """ +Identifies AWS IAM password recovery requests. An adversary may attempt to gain unauthorized AWS access by abusing +password recovery mechanisms. +""" +false_positives = [ + """ + Verify whether the user identity, user agent, and/or hostname should be requesting changes in your environment. + Password reset attempts from unfamiliar users should be investigated. If known behavior is causing false positives, + it can be exempted from the rule. + """, +] +from = "now-20m" +index = ["filebeat-*"] +interval = "10m" +language = "kuery" +license = "Elastic License" +name = "AWS IAM Password Recovery Requested" +references = ["https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/"] +risk_score = 21 +rule_id = "69c420e8-6c9e-4d28-86c0-8a2be2d1e78c" +severity = "low" +tags = ["AWS", "Elastic"] +type = "query" + +query = ''' +event.action:PasswordRecoveryRequested and event.provider:signin.amazonaws.com and event.outcome:success +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1078" +name = "Valid Accounts" +reference = "https://attack.mitre.org/techniques/T1078/" + + +[rule.threat.tactic] +id = "TA0001" +name = "Initial Access" +reference = "https://attack.mitre.org/tactics/TA0001/" +