|
2 | 2 | creation_date = "2024/11/04" |
3 | 3 | integration = ["endpoint", "crowdstrike", "sentinel_one_cloud_funnel"] |
4 | 4 | maturity = "production" |
5 | | -updated_date = "2025/03/20" |
| 5 | +updated_date = "2025/12/12" |
6 | 6 |
|
7 | 7 | [rule] |
8 | 8 | author = ["Elastic"] |
@@ -96,27 +96,36 @@ tags = [ |
96 | 96 | ] |
97 | 97 | timestamp_override = "event.ingested" |
98 | 98 | type = "eql" |
99 | | - |
100 | 99 | query = ''' |
101 | 100 | process where host.os.type == "linux" and event.type == "start" and |
102 | | - event.action in ("exec", "exec_event", "start", "ProcessRollup2") and |
103 | | - process.name in ("cat", "grep", "less", "more", "strings", "awk", "find", "xargs") and |
104 | | - process.args like ( |
105 | | - "/etc/security/*", "/etc/pam.d/*", "/etc/login.defs", "/lib/security/*", "/lib64/security/*", |
106 | | - "/usr/lib/security/*", "/usr/lib64/security/*", "/usr/lib/x86_64-linux-gnu/security/*", |
107 | | - "/home/*/.aws/credentials", "/home/*/.aws/config", "/home/*/.config/gcloud/*credentials.json", |
108 | | - "/home/*/.config/gcloud/configurations/config_default", "/home/*/.azure/accessTokens.json", |
109 | | - "/home/*/.azure/azureProfile.json" |
110 | | - ) and |
111 | | -not process.parent.name in ("wazuh-modulesd", "lynis") |
| 101 | +event.action in ("exec", "exec_event", "start", "ProcessRollup2") and |
| 102 | +process.name in ("cat", "less", "more", "strings", "find", "xargs") and |
| 103 | +process.parent.executable != null and |
| 104 | +process.args like ( |
| 105 | + "/etc/security/*", "/etc/pam.d/*", "/etc/login.defs", "/lib/security/*", "/lib64/security/*", |
| 106 | + "/usr/lib/security/*", "/usr/lib64/security/*", "/usr/lib/x86_64-linux-gnu/security/*", |
| 107 | + "/home/*/.aws/credentials", "/home/*/.aws/config", "/home/*/.config/gcloud/*credentials.json", |
| 108 | + "/home/*/.config/gcloud/configurations/config_default", "/home/*/.azure/accessTokens.json", |
| 109 | + "/home/*/.azure/azureProfile.json" |
| 110 | +) and not ( |
| 111 | + process.parent.name in ("wazuh-modulesd", "lynis") or |
| 112 | + process.command_line in ("cat /etc/login.defs" , "cat /home/asterisk/.aws/credentials") or |
| 113 | + ?process.parent.command_line in ( |
| 114 | + "/bin/sh /usr/sbin/lynis audit system --cronjob", |
| 115 | + "/usr/bin/find -L /etc/security/limits.conf /etc/security/limits.d -type f -exec /usr/bin/cat {} ;", |
| 116 | + "/usr/bin/find /etc/security/limits.conf /etc/security/limits.d -type f -exec /usr/bin/cat {} ;" |
| 117 | + ) or |
| 118 | + ?process.parent.args in ("/opt/imperva/ragent/bin/get_sys_resources.sh", "/usr/sbin/lynis", "./terra_linux.sh") or |
| 119 | + process.args == "/usr/bin/coreutils" or |
| 120 | + (process.parent.name == "pwsh" and process.parent.command_line like "*Evaluate-STIG*") or |
| 121 | + ?process.parent.executable == "/usr/sap/audit_scripts/auto_audit_gral.sh" |
| 122 | +) |
112 | 123 | ''' |
113 | 124 |
|
114 | | - |
115 | 125 | [[rule.threat]] |
116 | 126 | framework = "MITRE ATT&CK" |
117 | 127 |
|
118 | 128 | [rule.threat.tactic] |
119 | 129 | id = "TA0007" |
120 | 130 | name = "Discovery" |
121 | 131 | reference = "https://attack.mitre.org/tactics/TA0007/" |
122 | | - |
|
0 commit comments