Statistical Model Detected C2 Beaconing Activity with High Confidence
A statistical model has identified command-and-control (C2) beaconing activity with high confidence. Beaconing can help attackers maintain stealthy communication with their C2 servers, receive instructions and payloads, exfiltrate data and maintain persistence in a network.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2023/09/22"
3integration = ["beaconing"]
4maturity = "production"
5min_stack_comments = "Beaconing package updates and support"
6min_stack_version = "8.10.1"
7updated_date = "2023/10/26"
8
9[rule]
10author = ["Elastic"]
11description = """
12A statistical model has identified command-and-control (C2) beaconing activity with high confidence. Beaconing can help
13attackers maintain stealthy communication with their C2 servers, receive instructions and payloads, exfiltrate data and
14maintain persistence in a network.
15"""
16from = "now-1h"
17index = ["ml_beaconing.all"]
18language = "kuery"
19license = "Elastic License v2"
20name = "Statistical Model Detected C2 Beaconing Activity with High Confidence"
21note = """## Setup
22
23The Beaconing integration must be enabled and related ML jobs configured for this rule to be effective. Please refer to this rule's references for more information.
24"""
25references = [
26 "https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
27 "https://docs.elastic.co/en/integrations/beaconing",
28 "https://www.elastic.co/security-labs/identifying-beaconing-malware-using-elastic"
29]
30risk_score = 21
31rule_id = "0ab319ef-92b8-4c7f-989b-5de93c852e93"
32severity = "low"
33tags = ["Domain: Network", "Use Case: C2 Beaconing Detection", "Tactic: Command and Control"]
34timestamp_override = "event.ingested"
35type = "query"
36
37query = '''
38beacon_stats.beaconing_score: 3
39'''
40
41
42[[rule.threat]]
43framework = "MITRE ATT&CK"
44[[rule.threat.technique]]
45id = "T1102"
46name = "Web Service"
47reference = "https://attack.mitre.org/techniques/T1102/"
48[[rule.threat.technique.subtechnique]]
49id = "T1102.002"
50name = "Bidirectional Communication"
51reference = "https://attack.mitre.org/techniques/T1102/002/"
52
53
54
55[rule.threat.tactic]
56id = "TA0011"
57name = "Command and Control"
58reference = "https://attack.mitre.org/tactics/TA0011/"
Setup
The Beaconing integration must be enabled and related ML jobs configured for this rule to be effective. Please refer to this rule's references for more information.
References
Related rules
- Statistical Model Detected C2 Beaconing Activity
- Machine Learning Detected DGA activity using a known SUNBURST DNS domain
- Machine Learning Detected a DNS Request Predicted to be a DGA Domain
- Machine Learning Detected a DNS Request With a High DGA Probability Score
- Connection to Commonly Abused Free SSL Certificate Providers