11[metadata ]
22creation_date = " 2024/11/04"
3- integration = [" endpoint" ]
3+ integration = [" endpoint" , " crowdstrike " , " sentinel_one_cloud_funnel " ]
44maturity = " production"
5- updated_date = " 2024/11/04"
5+ min_stack_version = " 8.13.0"
6+ min_stack_comments = " Breaking change at 8.13.0 for SentinelOne Integration."
7+ updated_date = " 2025/01/08"
68
79[rule ]
810author = [" Elastic" ]
@@ -11,7 +13,7 @@ This rule identifies when a web server is spawned via Python. Attackers may use
1113exfiltrate/infiltrate data or to move laterally within a network.
1214"""
1315from = " now-9m"
14- index = [" logs-endpoint.events.*" ]
16+ index = [" logs-endpoint.events.*" , " logs-crowdstrike.fdr* " , " logs-sentinel_one_cloud_funnel.* " , " endgame-* " ]
1517language = " eql"
1618license = " Elastic License v2"
1719name = " Web Server Spawned via Python"
@@ -49,17 +51,22 @@ tags = [
4951 " Use Case: Threat Detection" ,
5052 " Tactic: Execution" ,
5153 " Data Source: Elastic Defend" ,
54+ " Data Source: Crowdstrike" ,
55+ " Data Source: SentinelOne" ,
56+ " Data Source: Elastic Endgame" ,
5257]
5358timestamp_override = " event.ingested"
5459type = " eql"
5560query = '''
56- process where host.os.type == "linux" and event.type == "start" and event.action == "exec" and (
57- (process.name like "python*" and process.args in ("http.server ", "SimpleHTTPServer")) or
61+ process where host.os.type == "linux" and event.type == "start" and
62+ event.action in ("exec", "exec_event", "start ", "ProcessRollup2") and
5863 (
59- process.name in ("bash", "dash", "sh", "tcsh", "csh", "zsh", "ksh", "fish") and
60- process.command_line like~ "*python* -m http.server*"
64+ (process.name like "python*" and process.args in ("http.server", "SimpleHTTPServer")) or
65+ (
66+ process.name in ("bash", "dash", "sh", "tcsh", "csh", "zsh", "ksh", "fish") and
67+ process.command_line like~ "*python* -m http.server*"
68+ )
6169 )
62- )
6370'''
6471
6572[[rule .threat ]]
0 commit comments