Files
sigma-rules/rules/linux/linux_socat_activity.toml
T
Ross Wolf 5fcece8416 Populate rules/ directory.
Co-Authored-By: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-Authored-By: Craig Chamberlain <randomuserid@users.noreply.github.com>
Co-Authored-By: David French <56409778+threat-punter@users.noreply.github.com>
Co-Authored-By: Derek Ditch <dcode@users.noreply.github.com>
Co-Authored-By: Justin Ibarra <brokensound77@users.noreply.github.com>
2020-06-29 22:57:03 -06:00

35 lines
1.1 KiB
TOML

[metadata]
creation_date = "2020/02/18"
ecs_version = ["1.4.0"]
maturity = "production"
updated_date = "2020/02/18"
[rule]
author = ["Elastic"]
description = """
A Socat process is running on a Linux host. Socat is often used as a persistence mechanism by exporting a reverse shell,
or by serving a shell on a listening port. Socat is also sometimes used for lateral movement.
"""
false_positives = [
"""
Socat is a dual-use tool that can be used for benign or malicious activity. Some normal use of this program, at
varying levels of frequency, may originate from scripts, automation tools, and frameworks. Usage by web servers is
more likely to be suspicious.
""",
]
index = ["auditbeat-*"]
language = "kuery"
license = "Elastic License"
name = "Socat Process Activity"
references = ["https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method-2-using-socat"]
risk_score = 47
rule_id = "cd4d5754-07e1-41d4-b9a5-ef4ea6a0a126"
severity = "medium"
tags = ["Elastic", "Linux"]
type = "query"
query = '''
process.name:socat and not process.args:-V and event.action:executed
'''