1
1
[metadata ]
2
2
creation_date = " 2023/09/04"
3
- integration = [" endpoint" ]
3
+ integration = [" endpoint" , " auditd_manager " ]
4
4
maturity = " production"
5
5
min_stack_comments = " New fields added: required_fields, related_integrations, setup"
6
6
min_stack_version = " 8.3.0"
7
- updated_date = " 2023/10/19 "
7
+ updated_date = " 2024/02/20 "
8
8
9
9
[rule ]
10
10
author = [" Elastic" ]
@@ -14,7 +14,7 @@ Adversaries may leverage built-in tools such as ping, netcat or socat to execute
14
14
attempting to evade detection or due to the lack of network mapping tools available on the compromised host.
15
15
"""
16
16
from = " now-9m"
17
- index = [" logs-endpoint.events.*" ]
17
+ index = [" logs-endpoint.events.*" , " endgame-* " , " auditbeat-* " , " logs-auditd_manager.auditd-* " ]
18
18
language = " kuery"
19
19
license = " Elastic License v2"
20
20
name = " Potential Network Scan Executed From Host"
@@ -48,12 +48,20 @@ For more details on Elastic Defend refer to the [helper guide](https://www.elast
48
48
49
49
"""
50
50
severity = " medium"
51
- tags = [" Domain: Endpoint" , " OS: Linux" , " Use Case: Threat Detection" , " Tactic: Discovery" , " Data Source: Elastic Defend" ]
51
+ tags = [
52
+ " Domain: Endpoint" ,
53
+ " OS: Linux" ,
54
+ " Use Case: Threat Detection" ,
55
+ " Tactic: Discovery" ,
56
+ " Data Source: Elastic Defend" ,
57
+ " Data Source: Elastic Endgame" ,
58
+ " Data Source: Auditd Manager"
59
+ ]
52
60
timestamp_override = " event.ingested"
53
61
type = " threshold"
54
62
query = '''
55
- host.os.type:linux and event.action:exec and event.type:start and
56
- process.name:(ping or nping or hping or hping2 or hping3 or nc or ncat or netcat or socat)
63
+ event.category:process and host.os.type:linux and event.action:( exec or exec_event or executed or process_started) and
64
+ event.type:start and process.name:(ping or nping or hping or hping2 or hping3 or nc or ncat or netcat or socat)
57
65
'''
58
66
59
67
[[rule .threat ]]
0 commit comments