diff --git a/rules/falco_rules.yaml b/rules/falco_rules.yaml index 7707491f..789b7e48 100644 --- a/rules/falco_rules.yaml +++ b/rules/falco_rules.yaml @@ -3240,3 +3240,10 @@ command=%proc.cmdline pid=%proc.pid file=%fd.name parent=%proc.pname gparent=%proc.aname[2] ggparent=%proc.aname[3] gggparent=%proc.aname[4] container_id=%container.id image=%container.image.repository) priority: WARNING tags: [filesystem, mitre_credential_access, mitre_discovery] + +- rule: PTRACE attached to process + desc: "This rule detects an attempt to inject code into a process using PTRACE." + condition: evt.type=ptrace and evt.dir=> and evt.arg.request=11 and proc_name_exists + output: Detected ptrace PTRACE_ATTACH attempt (proc.cmdline=%proc.cmdline container=%container.info evt.type=%evt.type evt.arg.request=%evt.arg.request proc.pid=%proc.pid proc.cwd=%proc.cwd proc.ppid=%proc.ppid proc.pcmdline=%proc.pcmdline proc.sid=%proc.sid proc.exepath=%proc.exepath user.uid=%user.uid user.loginuid=%user.loginuid user.loginname=%user.loginname user.name=%user.name group.gid=%group.gid group.name=%group.name container.id=%container.id container.name=%container.name image=%container.image.repository) + priority: WARNING + tags: [process] \ No newline at end of file