
Summary
The detection rule "Unusual File Transfer Utility Launched" is designed to identify the execution of specific file transfer utilities on Linux systems that may indicate potential data exfiltration by attackers. This rule utilizes the Elastic Search Query Language (ES|QL) to process logs from Elastic Defend, monitoring events related to process initiation. By narrowing down to processes associated with common file transfer utilities such as `scp`, `ftp`, and `rsync`, the rule can flag unusual patterns that suggest potential malicious activity. Notably, it looks for events where a particular executable is launched only a few times (less than 5) from a single agent, aiming to detect less frequent but suspicious transfers, which could indicate an attempt to steal data from the system. It operates on a 1-hour interval and monitors for `start` events where the action is execution. The rule leverages the MITRE ATT&CK framework to align with tactics focused on exfiltration and execution, thus providing a contextual basis for detecting potential threat activity.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Application Log
Created: 2025-02-21