-
Notifications
You must be signed in to change notification settings - Fork 614
[Rule Tuning] Linux DR Tuning - 2 #5481
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
|
⛔️ Test failed Results
|
| query = ''' | ||
| process where host.os.type == "linux" and event.type == "start" and event.action in ("exec", "exec_event", "start", "ProcessRollup2", "executed", "process_started") | ||
| and process.name == "proxychains" | ||
| process where host.os.type == "linux" and event.type == "start" and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this just a format change ?
| process.parent.name like~ ("privsep-helper", "platform-python*", "init.ipv6-global", "wsl-bootstrap") or | ||
| ?process.parent.executable == "/usr/sbin/sshd" or | ||
| ?process.parent.args in ( | ||
| "/usr/lib/pritunl/usr/bin/pritunl", "/usr/bin/dockerd-rootless.sh", "/etc/rc.d/init.d/network", "/etc/rc0.d/K90network" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For "/usr/bin/dockerd-rootless.sh", from the docker docs (from Docker, and from VMware) it looks like this can also be invoked at setup not just in the ExecStart in the Docker service definition.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't understand the comment exactly; what would you like me to resolve here?
|
Looks good, minor comment, but not a blocker. Happy to approve when https://github.com/elastic/detection-rules/pull/5481/changes#r2626499614 is resolved 👍 |
Pull Request Summary
Why
This PR expands detection coverage, improves rule accuracy, and adds support for new data sources (notably SentinelOne Cloud Funnel and Auditd Manager) in several Linux security detection rules.
What changed
General
Integration/Data Source Expansion
sentinel_one_cloud_funnelandauditd_managerintegrations to multiple rules.logs-sentinel_one_cloud_funnel.*logs-auditd_manager.auditd-*endgame-*logs-endpoint.events.process*logs-endpoint.events.file*logs-crowdstrike.fdr*auditbeat-*Rule Logic and Field Adjustments
process.group_leader.executabletoprocess.parent.executable, fromuser.nametohost.idoragent.id).now-10dtonow-3d,now-7dtonow-5d)."start"and"ProcessRollup2").maxspanfrom 1s to 3s in thecatnetwork activity rule.Severity and Risk Score
Rule Descriptions and Formatting
Behavioral impact
agent.idinstead ofhost.id).Risks/edge cases
process.parent.name like ".*") could increase false positives if not carefully monitored.Rollout notes
Notable Rule-Specific Changes
collection_linux_clipboard_activity.toml
process.parentinstead ofprocess.group_leader.agent.idandprocess.parent.executable.command_and_control_aws_cli_endpoint_url_used.toml
host.idinstead ofuser.name.command_and_control_cat_network_activity.toml
maxspanfrom 1s to 3s.command_and_control_curl_socks_proxy_detected.toml
command_and_control_git_repo_or_file_download_to_sus_dir.toml
logs-endpoint.events.file*.