Skip to content

Commit fb40a4a

Browse files
Description updation across multiple rules (#1893)
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
1 parent 9ad3d39 commit fb40a4a

9 files changed

+43
-32
lines changed

rules/linux/execution_apt_binary.toml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
11
[metadata]
22
creation_date = "2022/02/24"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
99
Identifies Linux binary apt/apt-get abuse to breakout out of restricted shells or environments by spawning an
10-
interactive system shell. This activity is not standard use with this binary for a user or system administrator. It
11-
indicates a potentially malicious actor attempting to improve the capabilities or stability of their access.
10+
interactive system shell. The apt utility allows us to manage installation and removal of softwares on Debian based
11+
Linux distributions and the activity of spawning shell is not a standard use of this binary for a user or system
12+
administrator. It indicates a potentially malicious actor attempting to improve the capabilities or stability of their
13+
access.
1214
"""
1315
from = "now-9m"
1416
index = ["logs-endpoint.events.*"]

rules/linux/execution_awk_binary_shell.toml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
[metadata]
22
creation_date = "2022/02/24"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
99
Identifies Linux binary awk abuse to breakout out of restricted shells or environments by spawning an interactive system
10-
shell. This activity is not standard use with this binary for a user or system administrator. It indicates a potentially
10+
shell. The awk utility is a text processing language used for data extraction and reporting tools and the activity of
11+
spawning shell is not a standard use of this binary for a user or system administrator. It indicates a potentially
1112
malicious actor attempting to improve the capabilities or stability of their access.
1213
"""
1314
from = "now-9m"

rules/linux/execution_env_binary.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[metadata]
22
creation_date = "2022/02/24"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies Linux binary env abuse to break out from restricted environments by spawning an interactive system shell.This
10-
activity is not standard use with this binary for a user or system administrator. It indicates a potentially malicious
11-
actor attempting to improve the capabilities or stability of their access
9+
Identifies Linux binary env abuse to break out from restricted environments by spawning an interactive system shell.The
10+
env utility is a shell command for Unix like OS which is used to print a list of environment variables and the activity
11+
of spawning shell is not a standard use of this binary for a user or system administrator. It indicates a potentially
12+
malicious actor attempting to improve the capabilities or stability of their access
1213
"""
1314
from = "now-9m"
1415
index = ["logs-endpoint.events.*"]

rules/linux/execution_expect_binary.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[metadata]
22
creation_date = "2022/03/07"
33
maturity = "development"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies Linux binary expect abuse to break out from restricted environments by spawning an interactive system shell
10-
This activity is not standard use with this binary for a user or system administrator and could potentially indicate
11-
malicious actor attempting to improve the capabilities or stability of their access.
9+
Identifies Linux binary expect abuse to break out from restricted environments by spawning an interactive system shell.
10+
The expect utility allows us to automate control of interactive applications such as telnet,ftp,ssh and others and the
11+
activity of spawning shell is not a standard use of this binary for a user or system administrator and could potentially
12+
indicate malicious actor attempting to improve the capabilities or stability of their access.
1213
"""
1314
from = "now-9m"
1415
index = ["logs-endpoint.events.*"]

rules/linux/execution_find_binary.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[metadata]
22
creation_date = "2022/02/28"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
99
Identifies Linux binary find abuse to break out from restricted environments by spawning an interactive system shell.
10-
This activity is not standard use with this binary for a user or system administrator. It indicates a potentially
11-
malicious actor attempting to improve the capabilities or stability of their access.
10+
The find command in Unix is a command line utility for walking a file hirerarchy and the activity of spawning shell is
11+
not a standard use of this binary for a user or system administrator.It indicates a potentially malicious actor
12+
attempting to improve the capabilities or stability of their access.
1213
"""
1314
from = "now-9m"
1415
index = ["logs-endpoint.events.*"]

rules/linux/execution_gcc_binary.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
[metadata]
22
creation_date = "2022/03/09"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies Linux binary gcc abuse to break out from restricted environments by spawning an interactive system shell.This
10-
activity is not standard use with this binary for a user or system administrator and could potentially indicate
9+
Identifies Linux binary gcc abuse to break out from restricted environments by spawning an interactive system shell.The
10+
gcc utility is a complier system for various languages and mainly used to complie C and C++ programs and the activity of
11+
spawning shell is not a standard use of this binary for a user or system administrator.It indicates a potentially
1112
malicious actor attempting to improve the capabilities or stability of their access.
1213
"""
1314
from = "now-9m"

rules/linux/execution_mysql_binary.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[metadata]
22
creation_date = "2022/03/09"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies MySQL server abuse to break out from restricted environments by spawning an interactive system shell.This
10-
activity is not standard use with this binary for a user or system administrator and could potentially indicate
11-
malicious actor attempting to improve the capabilities or stability of their access.
9+
Identifies MySQL server abuse to break out from restricted environments by spawning an interactive system shell.The
10+
MySQL is an open source relational database management system and the activity of spawning shell is not a standard use
11+
of this binary for a user or system administrator.It indicates a potentially malicious actor attempting to improve the
12+
capabilities or stability of their access.
1213
"""
1314
from = "now-9m"
1415
index = ["logs-endpoint.events.*"]

rules/linux/execution_nice_binary.toml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
11
[metadata]
22
creation_date = "2022/03/07"
33
maturity = "development"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
8-
description = """
9-
Identifies Linux binary nice abuse to break out from restricted environments by spawning an interactive system shell.This
10-
activity is not standard use with this binary for a user or system administrator. It indicates a potentially malicious
11-
actor attempting to improve the capabilities or stability of their access
8+
description = """
9+
Identifies Linux binary nice abuse to break out from restricted environments by spawning an interactive system shell.The
10+
nice command is used to invoke a utility or a shell script with a particular CPU priority, thus giving the process more
11+
or less CPU and the activity of spawning shell is not a standard use of this binary for a user or system
12+
administrator.It indicates a potentially malicious actor attempting to improve the capabilities or stability of their
13+
access.
1214
"""
1315
from = "now-9m"
1416
index = ["logs-endpoint.events.*"]

rules/linux/execution_ssh_binary.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[metadata]
22
creation_date = "2022/03/10"
33
maturity = "production"
4-
updated_date = "2022/03/17"
4+
updated_date = "2022/03/28"
55

66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies Linux binary ssh abuse to break out from restricted environments by spawning an interactive system shell.This
10-
activity is not standard use with this binary for a user or system administrator and could potentially indicate
11-
malicious actor attempting to improve the capabilities or stability of their access.
9+
Identifies Linux binary ssh abuse to break out from restricted environments by spawning an interactive system shell.The
10+
ssh is a network protocol that gives users,particularly system administrators a secure way to access a computer over a
11+
network and the activity of spawning shell is not a standard use of this binary for a user or system administrator.It
12+
indicates a potentially malicious actor attempting to improve the capabilities or stability of their access.
1213
"""
1314
from = "now-9m"
1415
index = ["logs-endpoint.events.*"]

0 commit comments

Comments
 (0)