Detection rules › Sigma

Potential Remote Desktop Tunneling

Severity
medium
Author
Tim Rauch, Elastic (idea)
Source
upstream

Detects potential use of an SSH utility to establish RDP over a reverse SSH Tunnel. This can be used by attackers to enable routing of network packets that would otherwise not reach their intended destination.

MITRE ATT&CK coverage

TacticTechniques
Lateral MovementT1021 Remote Services

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: all of selection

CommandLine|contains: ':3389'

Stage 2: all of selection_opt

or:
CommandLine|contains: ' -L '
CommandLine|contains: ' -P '
CommandLine|contains: ' -R '
CommandLine|contains: ' -pw '
CommandLine|contains: ' -ssh '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • -L
  • -P corpus 2 (sigma 2)
  • -R corpus 4 (sigma 4)
  • -pw
  • -ssh
  • :3389 corpus 3 (sigma 3)

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.