11[metadata ]
22creation_date = " 2020/02/18"
3- integration = [" endpoint" , " sentinel_one_cloud_funnel" ]
3+ integration = [" endpoint" , " auditd_manager " , " crowdstrike " , " sentinel_one_cloud_funnel" ]
44maturity = " production"
55updated_date = " 2025/10/15"
66
@@ -20,7 +20,10 @@ false_positives = [
2020]
2121from = " now-9m"
2222index = [
23- " logs-endpoint.events.network*" ,
23+ " auditbeat-*" ,
24+ " endgame-*" ,
25+ " logs-auditd_manager.auditd-*" ,
26+ " logs-crowdstrike.fdr*" ,
2427 " logs-endpoint.events.process*" ,
2528 " logs-sentinel_one_cloud_funnel.*" ,
2629]
@@ -120,23 +123,24 @@ tags = [
120123 " Tactic: Execution" ,
121124 " Resources: Investigation Guide" ,
122125 " Data Source: Elastic Defend" ,
126+ " Data Source: Elastic Endgame" ,
127+ " Data Source: Auditd Manager" ,
128+ " Data Source: Crowdstrike" ,
123129 " Data Source: SentinelOne" ,
124130]
125131type = " eql"
126132query = '''
127133process where host.os.type == "linux" and event.type == "start" and
134+ event.action in ("exec", "exec_event", "start", "ProcessRollup2", "executed", "process_started") and
128135process.name in ("nc","ncat","netcat","netcat.openbsd","netcat.traditional") and
129- (
136+ process.args like~ (
130137 /* bind shell to specific port or listener */
131- process.args:( "-*l*","-*p*") or
138+ "-*l*","-*p*",
132139 /* reverse shell to command-line interpreter used for command execution */
133- (process.args:("-*e*")) or
134- /* file transfer via stdout */
135- process.args:(">","<") or
136- /* file transfer via pipe */
137- (process.args:"|")
138- ) and
139- not process.command_line like~ ("*127.0.0.1*", "*localhost*")
140+ "-*e*",
141+ /* file transfer via stdout/pipe */
142+ ">","<", "|"
143+ )
140144'''
141145
142146[[rule .threat ]]
0 commit comments