
Summary
The rule titled 'Unusual D-Bus Daemon Child Process' is designed to detect potentially malicious activity in Linux environments where the D-Bus daemon (dbus-daemon) serves as a parent process. The D-Bus daemon facilitates inter-process communication, which can be exploited by attackers to execute unauthorized commands or escalate privileges. This EQL rule looks for child processes spawned from the dbus-daemon that do not match a list of known benign processes or execution contexts, giving security teams insight into unusual or suspicious behavior. The detection criteria include conditions on the process type, parent process specifics, and the command-line arguments, effectively filtering out benign instances and focusing on potential threats. The setup instructions outline the integration with Elastic Defend and the prerequisite of using Fleet for data collection. The alert generated by this rule could indicate attempts at process creation or modification based on the MITRE ATT&CK techniques of Persistence and Privilege Escalation. Recommended response actions include isolating affected systems and conducting investigations for unauthorized activities.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Container
- Application Log
- Network Traffic
ATT&CK Techniques
- T1543
- T1059
- T1059.004
Created: 2025-01-21