Files
sigma-rules/rules/ml/ml_linux_anomalous_metadata_process.toml
T
Justin Ibarra 97ee8cc9ac Refresh beats and ecs schemas and default to use latest to validate (#570)
* Refresh beats and ecs schemas and default to use latest to validate
* remove incorrect ecs_version from zoom rule
* remove stale ecs_version from rules
2020-12-01 13:24:20 -09:00

30 lines
879 B
TOML

[metadata]
creation_date = "2020/09/22"
maturity = "production"
updated_date = "2020/10/26"
[rule]
anomaly_threshold = 50
author = ["Elastic"]
description = """
Looks for anomalous access to the metadata service by an unusual process. The metadata service may be targeted in order
to harvest credentials or user data scripts containing secrets.
"""
false_positives = [
"""
A newly installed program or one that runs very rarely as part of a monthly or quarterly workflow could trigger this
detection rule.
""",
]
from = "now-45m"
interval = "15m"
license = "Elastic License"
machine_learning_job_id = "linux_rare_metadata_process"
name = "Unusual Linux Process Calling the Metadata Service"
risk_score = 21
rule_id = "9d302377-d226-4e12-b54c-1906b5aec4f6"
severity = "low"
tags = ["Elastic", "Host", "Linux", "Threat Detection", "ML"]
type = "machine_learning"