[metadata] creation_date = "2020/02/18" maturity = "production" updated_date = "2022/07/26" [rule] author = ["Elastic"] description = "Identifies suspicious commands executed via a web server, which may suggest a vulnerability and remote shell access." false_positives = [ """ Network monitoring or management products may have a web server component that runs shell commands as part of normal behavior. """, ] from = "now-9m" index = ["auditbeat-*", "logs-endpoint.events.*"] language = "kuery" license = "Elastic License v2" name = "Potential Shell via Web Server" references = ["https://pentestlab.blog/tag/web-shell/"] risk_score = 47 rule_id = "231876e7-4d1f-4d63-a47c-47dd1acdc1cb" severity = "medium" tags = ["Elastic", "Host", "Linux", "Threat Detection", "Persistence"] timestamp_override = "event.ingested" type = "query" query = ''' event.category:process and event.type:(start or process_started) and process.name:(bash or dash or ash or zsh or "python*" or "perl*" or "php*") and process.parent.name:("apache" or "nginx" or "www" or "apache2" or "httpd" or "www-data") ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1505" name = "Server Software Component" reference = "https://attack.mitre.org/techniques/T1505/" [[rule.threat.technique.subtechnique]] id = "T1505.003" name = "Web Shell" reference = "https://attack.mitre.org/techniques/T1505/003/" [rule.threat.tactic] id = "TA0003" name = "Persistence" reference = "https://attack.mitre.org/tactics/TA0003/"