Views:
The following table lists the rules you can add to a ruleset, including descriptions of the attack techniques the rules are designed to prevent, and a link to the MITRE ATT&CK site for more details.

ID
Name
Details
Mitre link
01
Modify shell configuration file
Detects attempts to modify shell configuration files.
02
Update package repository
Detects when package repositories are updated.
03
Read SSH information
Detects any attempt to read files in SSH directories by non-SSH programs.
04
Read sensitive file trusted after startup
Detects attempts to read any sensitive file by a trusted program after startup. Trusted programs might read these files at startup, but not afterwards.
05
System user interactive
Detects attempts to run interactive commands by a system (non-login) user.
06
Terminal shell in container
Detects when a shell command or script was used as the entrypoint or execution point into a container with an attached terminal.
07
System procs network activity
Detects network activity performed by system binaries that are not expected to send or receive any network traffic.
08
Contact EC2 Instance Metadata Service From Container
Detects attempts to contact the EC2 Instance Metadata Service from a container.
10
Launch Package Management Process in Container
Detects when a package management process is run inside container.
11
Netcat Remote Code Execution in Container
Detects when Netcat commands are run inside a container, which allows remote code execution.
12
Clear Log Activities
Detects the modification or removal of critical log files.
13
Create Symlink Over Sensitive Files
Detects when a symlink is created for a sensitive file.
14
Packet socket created in container
Detects new packet sockets at the device driver (OSI L2) in a container. Packet sockets can be used for ARP spoofing and privilege escalation (CVE-2020-14386) by an attacker.
15
Redirect STDOUT/STDIN to Network Connection in Container
Detects when STDOUT/STDIN is redirected to the network connection in a container, which is a potential reverse shell.
N/A
16
Linux Kernel Module Injection Detected
Detects when a kernel module was injected from a container.
17
Sudo Potential Privilege Escalation
Detects privilege escalation vulnerabilities affecting sudo (<= 1.9.5p2). Unprivileged users can elevate the user privileges to root by executing sudo using the sudoedit -s or sudoedit -i command with a command-line argument that ends with a single backslash character.
18
Launch Remote File Copy Tools in Container
Detects when remote file copy tools are launched in a container.
19
Specific discover tool executed in container
Detects the execution of discovery and hacking tools inside a container.
20
Amicontained download detected in container
Detects when an amicontained tool is downloaded.
21
Disable Security Tools
Detects attempts to disable specific security tools.
22
Docker or kubertes client executed in container
Detects when a docker or kubernetes client tool is executed inside a container.
23
Escape attempt detected in privileged container
Detects the usage of debugs and mounts in a container.
24
HugePages changed in container
Detects HugePages modification as part of mining changes done during XMRig usage.
25
Detect crypto miners using the Stratum protocol
Miners typically specify the mining pool to connect to with a URI that begins with
stratum+tcp
and variants.
26
Schedule Cron Jobs
Detects when cron jobs are scheduled.
27
Dynamic linker changed
Detects changes to a
/etc/ld.so.preload
file.
28
DB program spawned process
Detects when a DB-related program spawns a new process other than itself. Can indicate a successful SQL injection.
29
Lateral Movement using SSH
Detects SSH execution with
StrictHostKeyChecking
and batch mode. Can indicated a scripted lateral movement attempt.
30
Detect miner termination in container
Detects miner termination in a container, which can indicate a miner terminating a competing miner.
31
Launch Privileged Container
Detects the initial process started in a privileged container.
32
Delete or rename shell history
Detects when a shell history is deleted.
33
File attributes changed in container
Detects attempts to change attributes on a file in a container.
34
Set Setuid or Setgid bit
Detects when the setuid or setgid bits are set for an application, which will run with the privileges of the owning user or group.
35
Dangerous deletion detected in container
Detects when a file is deleted during indicator removal.
36
Possible IRC communication in container
Detects communication based on a known IRC port, such as TCP/6667, or TCP/6697 for TLS.
37
BOtB download detected in container
Detects downloads of complex analysis and exploitation tools for containers.
38
Peirates tool detected in container
Detects downloads of complex analysis and exploitation tools for containers.
39
Interpreted procs inbound network activity
Detects any inbound network activity performed by any interpreted program, such as Perl, Python, and Ruby.
40
Interpreted procs outbound network activity
Detects any outbound network activity performed by any interpreted program, such as Perl, Python, and Ruby.
41
Search Private Keys or Passwords
Detects grep searches for private keys or passwords, including the find command.
42
Unexpected process termination in container
Detects attempts to get specific processes and terminate them, which can indicate miner's deployment and rival's termination.
47
Suspicious log manipulation
Detects targeted modification of critical log files.
48
Switch Linux namespace
Detects the unauthorized usage of setns syscals, which could lead to container escape.
49
Launch Ingress Remote File Copy Tools in Container
Detects when ingress remote file copy tools are launched in a container.
50
Execution from /dev/shm
Detects file execution from the
/dev/shm
directory, which is a common tactic for threat actors to stash their files.
51
Find AWS Credentials
Detects find or grep commands trying to access AWS credentials.
52
PTRACE attached to process
Detects attempts to inject code into a process using PTRACE.
53
Create Hidden Files or Directories
Detects the creation of hidden files and directories.
54
Mkdir binary dirs
Detects attempts to create a directory below a set of binary directories.
55
Modify binary dirs
Detects attempts to modify any file below a set of binary directories.
56
Polkit Local Privilege Escalation
Detects attempts to exploit a privilege escalation vulnerability in Polkit's pkexec.
57
Write below rpm database
Detects attempts to write to the rpm database by any non-rpm related program.
58
Increase Resource Limits via Prlimit Command in Container
Detects when the prlimit command sets or reports the limits of system-wide resources.
59
A Local User Added in Container
Detects the creation of a user account in a container.
60
A Local User Deleted in Container
Detects the deletion of a user account in a container.
61
Write to Selinux Config
Detects attempts to write content to the
/etc/selinux/config
file.
62
Create Scheduled Task Using At
Detects when an
at
utility is used to perform task scheduling for initial or recurring execution of code.
63
Create Scheduled Task Using Systemd Timers
Detects when Systemd timers are used to perform task scheduling for initial or recurring execution of code.
64
Write to System Control
Detects attempts to write content to the
/etc/syscl.conf 
file.
68
Python urllib Import Command Execution
Detects when the
import urllib
or
import urllib2
command is run in Python or Python 3.
N/A
83
File Executed from Memory
Detects when reflective code is loaded into a process to conceal the execution of malicious payloads. Reflective loading involves allocating and executing payloads directly within the memory of the process.
84
Inject File to Process Memory Virtual Space
Detects when adversaries inject malicious code into processes using the /proc filesystem to evade process-based defenses and potentially elevate privileges. Proc memory injection is a method of executing arbitrary code in the address space of a separate live process.
89
Suspicious Directory Change via ProcFD
Detects process attempts to change the working directory using a proc-based file descriptor, which is a possible CVE-2024-21626 indicator.
N/A
93
Grep Search on Shell Configuration File
Detects attempts to search a shell configuration file.
N/A
96
Vulnerable liblzma loaded into sshd
Detects when a vulnerable liblzma, liblzma.so.5.6.0, or liblzma.so.5.6.1 library is loaded into
N/A
97
Iptables Modification
Detects when the iptables service is modified using a command execution.
N/A