|
2 | 2 | creation_date = "2023/06/09" |
3 | 3 | integration = ["endpoint"] |
4 | 4 | maturity = "production" |
5 | | -updated_date = "2024/09/23" |
| 5 | +updated_date = "2024/10/17" |
6 | 6 |
|
7 | 7 | [transform] |
8 | 8 | [[transform.osquery]] |
@@ -195,69 +195,72 @@ event.action in ("rename", "creation") and file.path : ( |
195 | 195 | "/opt/puppetlabs/puppet/bin/ruby", "/usr/libexec/platform-python", "/opt/imunify360/venv/bin/python3", |
196 | 196 | "/opt/eset/efs/lib/utild", "/usr/sbin/anacron", "/usr/bin/podman", "/kaniko/kaniko-executor" |
197 | 197 | ) or |
198 | | - file.path : "/var/spool/cron/crontabs/tmp.*" or |
| 198 | + file.path like ("/var/spool/cron/crontabs/tmp.*", "/etc/cron.d/jumpcloud-updater") or |
199 | 199 | file.extension in ("swp", "swpx", "swx", "dpkg-remove") or |
200 | 200 | file.Ext.original.extension == "dpkg-new" or |
201 | 201 | process.executable : ( |
202 | 202 | "/nix/store/*", "/var/lib/dpkg/*", "/tmp/vmis.*", "/snap/*", "/dev/fd/*", "/usr/libexec/platform-python*" |
203 | 203 | ) or |
204 | 204 | process.executable == null or |
205 | | - process.name in ("crontab", "crond", "executor", "puppet", "droplet-agent.postinst", "cf-agent") or |
| 205 | + process.name in ( |
| 206 | + "crond", "executor", "puppet", "droplet-agent.postinst", "cf-agent", "schedd", "imunify-notifier", "perl", |
| 207 | + "jumpcloud-agent", "crio", "dnf_install", "utild" |
| 208 | + ) or |
206 | 209 | (process.name == "sed" and file.name : "sed*") or |
207 | 210 | (process.name == "perl" and file.name : "e2scrub_all.tmp*") |
208 | 211 | ) |
209 | 212 | ''' |
210 | 213 |
|
211 | | - |
212 | 214 | [[rule.threat]] |
213 | 215 | framework = "MITRE ATT&CK" |
| 216 | + |
214 | 217 | [[rule.threat.technique]] |
215 | 218 | id = "T1053" |
216 | 219 | name = "Scheduled Task/Job" |
217 | 220 | reference = "https://attack.mitre.org/techniques/T1053/" |
| 221 | + |
218 | 222 | [[rule.threat.technique.subtechnique]] |
219 | 223 | id = "T1053.003" |
220 | 224 | name = "Cron" |
221 | 225 | reference = "https://attack.mitre.org/techniques/T1053/003/" |
222 | 226 |
|
223 | | - |
224 | | - |
225 | 227 | [rule.threat.tactic] |
226 | 228 | id = "TA0003" |
227 | 229 | name = "Persistence" |
228 | 230 | reference = "https://attack.mitre.org/tactics/TA0003/" |
| 231 | + |
229 | 232 | [[rule.threat]] |
230 | 233 | framework = "MITRE ATT&CK" |
| 234 | + |
231 | 235 | [[rule.threat.technique]] |
232 | 236 | id = "T1053" |
233 | 237 | name = "Scheduled Task/Job" |
234 | 238 | reference = "https://attack.mitre.org/techniques/T1053/" |
| 239 | + |
235 | 240 | [[rule.threat.technique.subtechnique]] |
236 | 241 | id = "T1053.003" |
237 | 242 | name = "Cron" |
238 | 243 | reference = "https://attack.mitre.org/techniques/T1053/003/" |
239 | 244 |
|
240 | | - |
241 | | - |
242 | 245 | [rule.threat.tactic] |
243 | 246 | id = "TA0004" |
244 | 247 | name = "Privilege Escalation" |
245 | 248 | reference = "https://attack.mitre.org/tactics/TA0004/" |
| 249 | + |
246 | 250 | [[rule.threat]] |
247 | 251 | framework = "MITRE ATT&CK" |
| 252 | + |
248 | 253 | [[rule.threat.technique]] |
249 | 254 | id = "T1053" |
250 | 255 | name = "Scheduled Task/Job" |
251 | 256 | reference = "https://attack.mitre.org/techniques/T1053/" |
| 257 | + |
252 | 258 | [[rule.threat.technique.subtechnique]] |
253 | 259 | id = "T1053.003" |
254 | 260 | name = "Cron" |
255 | 261 | reference = "https://attack.mitre.org/techniques/T1053/003/" |
256 | 262 |
|
257 | | - |
258 | | - |
259 | 263 | [rule.threat.tactic] |
260 | 264 | id = "TA0002" |
261 | 265 | name = "Execution" |
262 | 266 | reference = "https://attack.mitre.org/tactics/TA0002/" |
263 | | - |
|
0 commit comments