[metadata] creation_date = "2023/07/27" integration = ["endpoint", "auditd_manager"] maturity = "production" updated_date = "2024/10/18" [rule] author = ["Elastic"] description = """ This rule monitors for the usage of the most common clipboard utilities on unix systems by an uncommon process group leader. Adversaries may collect data stored in the clipboard from users copying information within or between applications. """ from = "now-9m" index = ["logs-endpoint.events.*", "endgame-*", "auditbeat-*", "logs-auditd_manager.auditd-*"] language = "kuery" license = "Elastic License v2" name = "Linux Clipboard Activity Detected" risk_score = 21 rule_id = "884e87cc-c67b-4c90-a4ed-e1e24a940c82" severity = "low" tags = [ "Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Collection", "Data Source: Elastic Defend", "Data Source: Elastic Endgame", "Data Source: Auditd Manager", ] timestamp_override = "event.ingested" type = "new_terms" query = ''' event.category:process and host.os.type:"linux" and event.type:"start" and event.action:("exec" or "exec_event" or "executed" or "process_started") and process.name:("xclip" or "xsel" or "wl-clipboard" or "clipman" or "copyq") and not process.parent.name:("bwrap" or "micro") ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1115" name = "Clipboard Data" reference = "https://attack.mitre.org/techniques/T1115/" [rule.threat.tactic] id = "TA0009" name = "Collection" reference = "https://attack.mitre.org/tactics/TA0009/" [rule.new_terms] field = "new_terms_fields" value = ["host.id", "process.group_leader.executable"] [[rule.new_terms.history_window_start]] field = "history_window_start" value = "now-7d"