
Summary
This detection rule is designed to identify suspicious file creation activities in the '/var/log/' directory on Linux systems, specifically focusing on processes that could either be hidden or executed from world-writable locations such as '/tmp/', '/var/tmp/', or '/dev/shm/'. Attackers often attempt to maintain stealth by writing logs or files in strategic locations to evade detection, with the '/var/log/' directory typically serving as a crucial logging location on Unix-like operating systems. The rule utilizes the Elastic Security platform to analyze system events from Elastic Defend, pinpointing potential threats through specific parameters that monitor relevant event categories and executable paths. The detection uses a combination of terms to isolate events like file creation, file renames, and script executions correlating to suspicious process behaviors. Structured around MITRE ATT&CK tactics, primarily focusing on Defense Evasion and Execution, this rule serves as a crucial component of proactive threat monitoring in environments that involve critical log management.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
- Application Log
- Sensor Health
ATT&CK Techniques
- T1564
- T1564.001
- T1059
- T1059.004
Created: 2025-03-11