heroui logo

Unusual Remote File Creation

Elastic Detection Rules

View Source
Summary
The 'Unusual Remote File Creation' detection rule aims to identify suspicious file creation activities that are typically associated with lateral movement within a network. It employs the 'new_terms' rule type to isolate file creation events initiated by recognized file transfer protocols such as SCP, FTP, SFTP, and others, while explicitly filtering out standard remote file creation paths to reduce false positives. The rule indicates potential malicious behavior linked to attackers attempting to navigate across network systems. To function correctly, this rule requires data from Elastic Defend or Auditbeat integrations on Linux environments. It utilizes a KQL query to evaluate event data and assign a medium risk score of 47, indicating notable suspicious activity. The implementation involves guidelines for setting up necessary integrations and configuring Elastic parameters for effective detection.
Categories
  • Endpoint
  • Linux
Data Sources
  • File
  • Process
  • Application Log
ATT&CK Techniques
  • T1021
  • T1021.004
  • T1570
Created: 2025-02-20