
Summary
This detection rule, authored by Elastic, focuses on identifying unusual outbound network connections from endpoint devices running macOS to a predefined list of suspicious webservice domains. The rule is set to monitor network events categorized as 'start', capturing logs within the last 9 months from the specified index, `logs-endpoint.events.network-*`. It uses the Kuery query language to filter events based on the operating system type, event category, and destination domain, which includes various services like Pastebin, Google Drive, Dropbox, and numerous other cloud file-sharing or temporary upload services. The tracked connections are intended to reveal potential command and control (C2) activities, aligning with the MITRE ATT&CK framework's Command and Control tactic, particularly leveraging the Application Layer Protocol technique. With a medium severity and risk score of 47, this rule aids in promptly detecting abnormal network behaviors that may indicate security threats.
Categories
- Endpoint
- macOS
Data Sources
- Network Traffic
- Application Log
ATT&CK Techniques
- T1071
- T1071.001
Created: 2025-03-26