[Tuning] Linux DR Tuning - Part 10 (#3462)

* [Tuning] Linux DR Tuning - Part 10

* updated_date bump

* Update persistence_kworker_file_creation.toml

* Update persistence_linux_backdoor_user_creation.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

(cherry picked from commit a76a3755d9)
This commit is contained in:
Ruben Groenewoud
2024-03-07 11:45:17 +01:00
committed by github-actions[bot]
parent 6141bc3dd7
commit 68cfb3dfde
5 changed files with 32 additions and 27 deletions
@@ -1,13 +1,12 @@
[metadata]
creation_date = "2022/07/11"
integration = ["endpoint", "auditd_manager"]
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
updated_date = "2023/12/19"
integration = ["endpoint"]
updated_date = "2024/02/21"
[transform]
[[transform.osquery]]
label = "Osquery - Retrieve all Kernel Modules"
query = "SELECT * FROM kernel_modules"
@@ -41,7 +40,7 @@ security products. Manually loading a kernel module in this manner should not be
suspcious or malicious behavior.
"""
from = "now-9m"
index = ["logs-endpoint.events.*", "endgame-*"]
index = ["logs-endpoint.events.*", "endgame-*", "auditbeat-*", "logs-auditd_manager.auditd-*"]
language = "eql"
license = "Elastic License v2"
name = "Kernel Module Load via insmod"
@@ -156,13 +155,13 @@ tags = [
"Tactic: Persistence",
"Threat: Rootkit",
"Data Source: Elastic Endgame",
"Data Source: Elastic Defend"
"Data Source: Elastic Defend",
"Data Source: Auditd Manager"
]
timestamp_override = "event.ingested"
type = "eql"
query = '''
process where host.os.type == "linux" and event.type == "start" and process.name == "insmod" and process.args : "*.ko"
and not process.parent.name in ("cisco-amp-helper", "ksplice-apply")
'''
[[rule.threat]]
@@ -182,4 +181,3 @@ reference = "https://attack.mitre.org/techniques/T1547/006/"
id = "TA0003"
name = "Persistence"
reference = "https://attack.mitre.org/tactics/TA0003/"