
Summary
The detection rule is designed to alert users to the execution of interactive processes from potentially suspicious directories within a container environment. It targets directories that have been historically utilized by adversaries for executing malicious code or data exfiltration. This rule operates on logs from the Elastic Defend for Containers integration, specifically monitoring for processes executed from transient or low-trust directories such as /tmp, /dev/shm, /var/tmp, and more. Adversaries may exploit these locations to gain interactive control over containers, often running reverse shells or tunneling tools to facilitate unauthorized operations. The rule aims to mitigate risks associated with such behavior through prompt detection, allowing for immediate investigation and response actions, bolstering container security and operational integrity.
Categories
- Containers
- Linux
Data Sources
- Container
ATT&CK Techniques
- T1620
- T1059
- T1059.004
- T1071
Created: 2026-02-06