Skip to content

Commit 70f8fa9

Browse files
Aegrahgithub-actions[bot]
authored andcommitted
[Tuning] Linux DR Tuning - Part 6 (#3457)
* [Tuning] Linux DR Tuning - Part 6 * Update discovery_ping_sweep_detected.toml --------- Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com> Removed changes from: - rules/linux/discovery_process_capabilities.toml - rules/linux/execution_abnormal_process_id_file_created.toml - rules/linux/execution_curl_cve_2023_38545_heap_overflow.toml (selectively cherry picked from commit f37a3bf)
1 parent d68174a commit 70f8fa9

File tree

2 files changed

+23
-9
lines changed

2 files changed

+23
-9
lines changed

rules/linux/discovery_ping_sweep_detected.toml

+14-6
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2023/09/04"
3-
integration = ["endpoint"]
3+
integration = ["endpoint", "auditd_manager"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2023/10/19"
7+
updated_date = "2024/02/20"
88

99
[rule]
1010
author = ["Elastic"]
@@ -14,7 +14,7 @@ Adversaries may leverage built-in tools such as ping, netcat or socat to execute
1414
attempting to evade detection or due to the lack of network mapping tools available on the compromised host.
1515
"""
1616
from = "now-9m"
17-
index = ["logs-endpoint.events.*"]
17+
index = ["logs-endpoint.events.*", "endgame-*", "auditbeat-*", "logs-auditd_manager.auditd-*"]
1818
language = "kuery"
1919
license = "Elastic License v2"
2020
name = "Potential Network Scan Executed From Host"
@@ -48,12 +48,20 @@ For more details on Elastic Defend refer to the [helper guide](https://www.elast
4848
4949
"""
5050
severity = "medium"
51-
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Discovery", "Data Source: Elastic Defend"]
51+
tags = [
52+
"Domain: Endpoint",
53+
"OS: Linux",
54+
"Use Case: Threat Detection",
55+
"Tactic: Discovery",
56+
"Data Source: Elastic Defend",
57+
"Data Source: Elastic Endgame",
58+
"Data Source: Auditd Manager"
59+
]
5260
timestamp_override = "event.ingested"
5361
type = "threshold"
5462
query = '''
55-
host.os.type:linux and event.action:exec and event.type:start and
56-
process.name:(ping or nping or hping or hping2 or hping3 or nc or ncat or netcat or socat)
63+
event.category:process and host.os.type:linux and event.action:(exec or exec_event or executed or process_started) and
64+
event.type:start and process.name:(ping or nping or hping or hping2 or hping3 or nc or ncat or netcat or socat)
5765
'''
5866

5967
[[rule.threat]]

rules/linux/discovery_sudo_allowed_command_enumeration.toml

+9-3
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2023/11/02"
7+
updated_date = "2024/02/20"
88

99
[rule]
1010
author = ["Elastic"]
@@ -47,14 +47,20 @@ For more details on Elastic Defend refer to the [helper guide](https://www.elast
4747
4848
"""
4949
severity = "low"
50-
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Discovery", "Data Source: Elastic Defend"]
50+
tags = [
51+
"Domain: Endpoint",
52+
"OS: Linux",
53+
"Use Case: Threat Detection",
54+
"Tactic: Discovery",
55+
"Data Source: Elastic Defend"
56+
]
5157
timestamp_override = "event.ingested"
5258
type = "eql"
5359
query = '''
5460
process where host.os.type == "linux" and event.type == "start" and event.action == "exec" and
5561
process.name == "sudo" and process.args == "-l" and process.args_count == 2 and
5662
process.parent.name in ("bash", "dash", "sh", "tcsh", "csh", "zsh", "ksh", "fish") and
57-
not group.Ext.real.id : "0" and not user.Ext.real.id : "0"
63+
not group.Ext.real.id : "0" and not user.Ext.real.id : "0" and not process.args == "dpkg"
5864
'''
5965

6066
[[rule.threat]]

0 commit comments

Comments
 (0)