Discovery (TA0007)(opens in a new tab or window)
process where host.os.type == "linux" and event.type == "start" and event.action == "exec" and
process.entry_leader.entry_meta.type == "container" and process.name in (
"nc.traditional", "nc", "ncat", "netcat", "nmap", "dig", "nslookup", "tcpdump", "tshark", "ngrep", "telnet",
"mitmproxy", "socat", "zmap", "masscan", "zgrab"
)
Install detection rules in Elastic Security
Detect Suspicious Network Tool Launched Inside A Container in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).