Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cleanup(rules): initial tagging of sandbox or incubating rules round3 #113

Merged
merged 1 commit into from
Jul 26, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions rules/falco_rules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2329,7 +2329,7 @@
Unexpected setuid call by non-sudo, non-root program (user=%user.name user_loginuid=%user.loginuid cur_uid=%user.uid parent=%proc.pname
command=%proc.cmdline pid=%proc.pid uid=%evt.arg.uid container_id=%container.id image=%container.image.repository)
priority: NOTICE
tags: [host, container, users, mitre_privilege_escalation, T1548.001]
tags: [maturity_incubating, host, container, users, mitre_privilege_escalation, T1548.001]

- macro: user_known_user_management_activities
condition: (never_true)
Expand Down Expand Up @@ -2535,7 +2535,7 @@
Package management process launched in container (user=%user.name user_loginuid=%user.loginuid
command=%proc.cmdline pid=%proc.pid container_id=%container.id container_name=%container.name image=%container.image.repository:%container.image.tag exe_flags=%evt.arg.flags)
priority: ERROR
tags: [container, process, software_mgmt, mitre_persistence, T1505]
tags: [maturity_incubating, container, process, software_mgmt, mitre_persistence, T1505]

- rule: Netcat Remote Code Execution in Container
desc: >
Expand Down Expand Up @@ -2633,7 +2633,7 @@
image=%container.image.repository:%container.image.tag exe_flags=%evt.arg.flags)
priority:
WARNING
tags: [host, container, process, filesystem, mitre_credential_access, T1552.001]
tags: [maturity_incubating, host, container, process, filesystem, mitre_credential_access, T1552.001]

- list: log_directories
items: [/var/log, /dev/log]
Expand Down Expand Up @@ -2725,7 +2725,7 @@
Shell history had been deleted or renamed (user=%user.name user_loginuid=%user.loginuid type=%evt.type command=%proc.cmdline pid=%proc.pid fd.name=%fd.name name=%evt.arg.name path=%evt.arg.path oldpath=%evt.arg.oldpath %container.info)
priority:
WARNING
tags: [host, container, process, filesystem, mitre_defense_evasion, T1070]
tags: [maturity_incubating, host, container, process, filesystem, mitre_defense_evasion, T1070]

# This rule is deprecated and will/should never be triggered. Keep it here for backport compatibility.
# Rule Delete or rename shell history is the preferred rule to use now.
Expand Down Expand Up @@ -3446,7 +3446,7 @@
(proc.name = "find" and proc.args endswith ".aws/credentials"))
output: Detected AWS credentials search activity (user.name=%user.name user.loginuid=%user.loginuid proc.cmdline=%proc.cmdline container.id=%container.id container_name=%container.name evt.type=%evt.type evt.res=%evt.res proc.pid=%proc.pid proc.cwd=%proc.cwd proc.ppid=%proc.ppid proc.pcmdline=%proc.pcmdline proc.sid=%proc.sid proc.exepath=%proc.exepath user.uid=%user.uid user.loginname=%user.loginname group.gid=%group.gid group.name=%group.name container.name=%container.name image=%container.image.repository:%container.image.tag exe_flags=%evt.arg.flags)
priority: WARNING
tags: [host, container, mitre_credential_access, process, aws, T1552]
tags: [maturity_incubating, host, container, process, aws, mitre_credential_access, T1552]

- rule: Execution from /dev/shm
desc: This rule detects file execution from the /dev/shm directory, a common tactic for threat actors to stash their readable+writable+(sometimes)executable files.
Expand Down
Loading