Skip to content

Commit 0fabbf7

Browse files
Aegrahtradebot-elastic
authored andcommitted
[New Rule] Web Server Unusual Spike in Error Logs (#5339)
* [New Rule] Web Server Unusual Spike in Error Logs * Update reconnaissance_web_server_unusual_spike_in_error_logs.toml * Update rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml * ++ * Remove event limit from error log rule Removed limit on the number of events in the rule. * Rename rule to 'Web Server Potential Spike in Error Logs' * Update rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml Co-authored-by: Jonhnathan <[email protected]> * Update rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml Co-authored-by: shashank-elastic <[email protected]> * Update rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml * Update rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Jonhnathan <[email protected]> Co-authored-by: shashank-elastic <[email protected]> (cherry picked from commit 4f8c967)
1 parent ebf3af5 commit 0fabbf7

File tree

1 file changed

+75
-0
lines changed

1 file changed

+75
-0
lines changed
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
[metadata]
2+
creation_date = "2025/11/19"
3+
integration = ["nginx", "apache", "apache_tomcat", "iis"]
4+
maturity = "production"
5+
updated_date = "2025/11/19"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
This rule detects unusual spikes in error logs from web servers, which may indicate reconnaissance activities such
11+
as vulnerability scanning or fuzzing attempts by adversaries. These activities often generate a high volume of error
12+
responses as they probe for weaknesses in web applications. Error response codes may potentially indicate server-side
13+
issues that could be exploited.
14+
"""
15+
from = "now-9m"
16+
interval = "10m"
17+
language = "esql"
18+
license = "Elastic License v2"
19+
name = "Potential Spike in Web Server Error Logs"
20+
risk_score = 21
21+
rule_id = "6631a759-4559-4c33-a392-13f146c8bcc4"
22+
severity = "low"
23+
tags = [
24+
"Domain: Web",
25+
"Use Case: Threat Detection",
26+
"Tactic: Reconnaissance",
27+
"Data Source: Nginx",
28+
"Data Source: Apache",
29+
"Data Source: Apache Tomcat",
30+
"Data Source: IIS",
31+
]
32+
timestamp_override = "event.ingested"
33+
type = "esql"
34+
query = '''
35+
from logs-network_traffic.http-*, logs-network_traffic.tls-*, logs-nginx.access-*, logs-apache.access-*, logs-apache_tomcat.access-*, logs-iis.access-*
36+
| keep
37+
@timestamp,
38+
event.type,
39+
event.dataset,
40+
source.ip,
41+
agent.id,
42+
host.name
43+
| where source.ip is not null
44+
| stats
45+
Esql.event_count = count(),
46+
Esql.host_name_values = values(host.name),
47+
Esql.agent_id_values = values(agent.id),
48+
Esql.event_dataset_values = values(event.dataset)
49+
by source.ip, agent.id
50+
| where
51+
Esql.event_count > 25
52+
'''
53+
54+
[[rule.threat]]
55+
framework = "MITRE ATT&CK"
56+
57+
[[rule.threat.technique]]
58+
id = "T1595"
59+
name = "Active Scanning"
60+
reference = "https://attack.mitre.org/techniques/T1595/"
61+
62+
[[rule.threat.technique.subtechnique]]
63+
id = "T1595.002"
64+
name = "Vulnerability Scanning"
65+
reference = "https://attack.mitre.org/techniques/T1595/002/"
66+
67+
[[rule.threat.technique.subtechnique]]
68+
id = "T1595.003"
69+
name = "Wordlist Scanning"
70+
reference = "https://attack.mitre.org/techniques/T1595/003/"
71+
72+
[rule.threat.tactic]
73+
id = "TA0043"
74+
name = "Reconnaissance"
75+
reference = "https://attack.mitre.org/tactics/TA0043/"

0 commit comments

Comments
 (0)