Files
sigma-rules/rules/ml/ml_linux_anomalous_metadata_user.toml
T
seth-goodwin 2065af89b1 [Rule Tuning] Tag Categorization Updates (#380)
* Add new categorization tags

* Change updated_date to 2020/10/26

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>, @bm11100
2020-10-26 13:50:45 -05:00

31 lines
1002 B
TOML

[metadata]
creation_date = "2020/09/22"
ecs_version = ["1.6.0"]
maturity = "production"
updated_date = "2020/10/26"
[rule]
anomaly_threshold = 75
author = ["Elastic"]
description = """
Looks for anomalous access to the cloud platform metadata service by an unusual user. The metadata service may be
targeted in order to harvest credentials or user data scripts containing secrets.
"""
false_positives = [
"""
A newly installed program, or one that runs under a new or rarely used user context, could trigger this detection
rule. Manual interrogation of the metadata service during debugging or troubleshooting could trigger this rule.
""",
]
from = "now-45m"
interval = "15m"
license = "Elastic License"
machine_learning_job_id = "linux_rare_metadata_user"
name = "Unusual Linux User Calling the Metadata Service"
risk_score = 21
rule_id = "1faec04b-d902-4f89-8aff-92cd9043c16f"
severity = "low"
tags = ["Elastic", "Host", "Linux", "Threat Detection", "ML"]
type = "machine_learning"