diff --git a/rules/linux/execution_suspicious_mining_process_creation_events.toml b/rules/linux/execution_suspicious_mining_process_creation_events.toml new file mode 100644 index 000000000..cee198c62 --- /dev/null +++ b/rules/linux/execution_suspicious_mining_process_creation_events.toml @@ -0,0 +1,49 @@ +[metadata] +creation_date = "2023/02/08" +integration = ["endpoint"] +maturity = "production" +min_stack_comments = "New fields added: required_fields, related_integrations, setup" +min_stack_version = "8.3.0" +updated_date = "2023/03/20" + +[rule] +author = ["Elastic"] +description = """ +Identifies service creation events of common mining services, possibly indicating the infection +of a system with a cryptominer. +""" +from = "now-9m" +index = ["logs-endpoint.events.*", "endgame-*"] +language = "eql" +license = "Elastic License v2" +name = "Suspicious Mining Process Creation Event" +risk_score = 47 +rule_id = "e2258f48-ba75-4248-951b-7c885edf18c2" +severity = "medium" +tags = ["Elastic", "Host", "Linux", "Threat Detection", "Execution", "Elastic Endgame"] +timestamp_override = "event.ingested" +type = "eql" +query = ''' +file where host.os.type == "linux" and event.type == "creation" and +event.action : ("creation", "file_create_event") and +file.name : ("aliyun.service", "moneroocean_miner.service", "c3pool_miner.service", "pnsd.service", "apache4.service", "pastebin.service", "xvf.service") +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +name = "Execution" +id = "TA0002" +reference = "https://attack.mitre.org/tactics/TA0002/" + +[[rule.threat.technique]] +name = "Command and Scripting Interpreter" +id = "T1059" +reference = "https://attack.mitre.org/techniques/T1059/" + +[[rule.threat.technique.subtechnique]] +name = "Unix Shell" +id = "T1059.004" +reference = "https://attack.mitre.org/techniques/T1059/004/"