[Rule Tuning] Linux DRs (#3628)

This commit is contained in:
Ruben Groenewoud
2024-04-30 13:26:09 +02:00
committed by GitHub
parent 8f6de1c235
commit 115c3a6dfd
2 changed files with 6 additions and 6 deletions
@@ -4,7 +4,7 @@ integration = ["endpoint"]
maturity = "production"
min_stack_comments = "Multiple field support in the New Terms rule type was added in Elastic 8.6"
min_stack_version = "8.6.0"
updated_date = "2023/12/12"
updated_date = "2024/04/30"
[rule]
author = ["Elastic"]
@@ -14,7 +14,7 @@ kernel's workqueue mechanism. They are responsible for executing work that has b
space, which might include tasks like handling interrupts, background activities, and other kernel-related tasks.
Attackers may attempt to evade detection by masquerading as a kernel worker process.
"""
from = "now-60m"
from = "now-9m"
index = ["logs-endpoint.events.*"]
language = "kuery"
license = "Elastic License v2"
@@ -69,7 +69,7 @@ process.name:kworker* and not destination.ip:(
"::1" or
"FE80::/10" or
"FF00::/8"
)
) and not destination.port:2049
'''
[[rule.threat]]
@@ -113,7 +113,7 @@ framework = "MITRE ATT&CK"
[rule.new_terms]
field = "new_terms_fields"
value = ["host.id", "process.name", "destination.ip"]
value = ["process.name", "destination.ip", "destination.port"]
[[rule.new_terms.history_window_start]]
field = "history_window_start"
@@ -4,7 +4,7 @@ integration = ["endpoint"]
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
updated_date = "2024/03/08"
updated_date = "2024/04/30"
[transform]
[[transform.osquery]]
@@ -154,7 +154,7 @@ process where host.os.type == "linux" and event.type == "start" and event.action
// gost & pivotnacci - spawned without process.parent.name
(process.name == "gost" and process.args : ("-L*", "-C*", "-R*")) or (process.name == "pivotnacci")) or (
// ssh
(process.name in ("ssh", "sshd") and (process.args in ("-R", "-L", "D", "-w") and process.args_count >= 4 and
(process.name in ("ssh", "sshd") and (process.args in ("-R", "-L", "-D", "-w") and process.args_count >= 4 and
not process.args : "chmod")) or
// sshuttle
(process.name == "sshuttle" and process.args in ("-r", "--remote", "-l", "--listen") and process.args_count >= 4) or