Open
Description
Describe the bug
This rule is looking for the download of a RAR or PS1 file from the internet, but the query is written as the source being internal, and the destination not being internal, so that would suggest a RAR file being uploaded to the internet. Am I missing something here? I was just going through and auditing some of the rules we have enabled, and I noticed this is enabled, but I have not received a single alert. I have downloaded plenty of RAR files myself since enabling this.
Expected behavior
Shouldn't this be looking for source.ip
not being internal, and the destination.ip
being internal?
This is the current query:
event.category:(network or network_traffic) and network.protocol:http and
(url.extension:(ps1 or rar) or url.path:(*.ps1 or *.rar)) and
not destination.ip:(
10.0.0.0/8 or
127.0.0.0/8 or
169.254.0.0/16 or
172.16.0.0/12 or
192.0.0.0/24 or
192.0.0.0/29 or
192.0.0.8/32 or
192.0.0.9/32 or
192.0.0.10/32 or
192.0.0.170/32 or
192.0.0.171/32 or
192.0.2.0/24 or
192.31.196.0/24 or
192.52.193.0/24 or
192.168.0.0/16 or
192.88.99.0/24 or
224.0.0.0/4 or
100.64.0.0/10 or
192.175.48.0/24 or
198.18.0.0/15 or
198.51.100.0/24 or
203.0.113.0/24 or
240.0.0.0/4 or
"::1" or
"FE80::/10" or
"FF00::/8"
) and
source.ip:(
10.0.0.0/8 or
172.16.0.0/12 or
192.168.0.0/16
)
But I would expect it to be this (swap destination and source):
event.category:(network or network_traffic) and network.protocol:http and
(url.extension:(ps1 or rar) or url.path:(*.ps1 or *.rar)) and
not source.ip:(
10.0.0.0/8 or
127.0.0.0/8 or
169.254.0.0/16 or
172.16.0.0/12 or
192.0.0.0/24 or
192.0.0.0/29 or
192.0.0.8/32 or
192.0.0.9/32 or
192.0.0.10/32 or
192.0.0.170/32 or
192.0.0.171/32 or
192.0.2.0/24 or
192.31.196.0/24 or
192.52.193.0/24 or
192.168.0.0/16 or
192.88.99.0/24 or
224.0.0.0/4 or
100.64.0.0/10 or
192.175.48.0/24 or
198.18.0.0/15 or
198.51.100.0/24 or
203.0.113.0/24 or
240.0.0.0/4 or
"::1" or
"FE80::/10" or
"FF00::/8"
) and
destination.ip:(
10.0.0.0/8 or
172.16.0.0/12 or
192.168.0.0/16
)