Files
sigma-rules/rules_building_block/discovery_userdata_request_from_ec2_instance.toml
T
Terrance DeJesus 3b994c1133 [New Rule] Building Block Rule - Attempt to Retrieve User Data from AWS EC2 Instance (#3593)
* adding new rule 'Attempt to Retrieve User Data from AWS EC2 Instance'

* Update rules_building_block/discovery_userdata_request_from_ec2_instance.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2024-05-28 11:15:04 -04:00

63 lines
1.9 KiB
TOML

[metadata]
creation_date = "2024/04/14"
integration = ["aws"]
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.9.0"
updated_date = "2024/04/14"
[rule]
author = ["Elastic"]
building_block_type = "default"
description = """
Identifies discovery request `DescribeInstanceAttribute` with the attribute userData and instanceId in AWS CloudTrail
logs. This may indicate an attempt to retrieve user data from an EC2 instance. Adversaries may use this information to
gather sensitive data from the instance or to identify potential vulnerabilities. This is a building block rule that
does not generate an alert on its own, but serves as a signal for anomalous activity.
"""
from = "now-119m"
index = ["filebeat-*", "logs.aws.cloudtrail-*"]
interval = "60m"
language = "kuery"
license = "Elastic License v2"
name = "Attempt to Retrieve User Data from AWS EC2 Instance"
references = [
"https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstanceAttribute.html",
"https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data",
]
risk_score = 21
rule_id = "c1e79a70-fa6f-11ee-8bc8-f661ea17fbce"
severity = "low"
tags = [
"Domain: Cloud",
"Data Source: AWS",
"Data Source: Amazon Web Services",
"Data Source: Amazon EC2",
"Use Case: Log Auditing",
"Tactic: Discovery",
"Rule Type: BBR"
]
timestamp_override = "event.ingested"
type = "query"
query = '''
event.dataset:aws.cloudtrail
and event.action:DescribeInstanceAttribute
and aws.cloudtrail.request_parameters:(*attribute=userData* and *instanceId*)
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1580"
name = "Cloud Infrastructure Discovery"
reference = "https://attack.mitre.org/techniques/T1580/"
[rule.threat.tactic]
id = "TA0007"
name = "Discovery"
reference = "https://attack.mitre.org/tactics/TA0007/"