[metadata] creation_date = "2020/09/03" maturity = "production" updated_date = "2021/03/03" [rule] anomaly_threshold = 25 author = ["Elastic"] description = """ Looks for unusual kernel module activity. Kernel modules are sometimes used by malware and persistence mechanisms for stealth. """ false_positives = [ """ A Linux host running unusual device drivers or other kinds of kernel modules could trigger this detection. Troubleshooting or debugging activity using unusual arguments could also trigger this detection. """, ] from = "now-45m" interval = "15m" license = "Elastic License v2" machine_learning_job_id = "linux_rare_kernel_module_arguments" name = "Anomalous Kernel Module Activity" references = ["references"] risk_score = 21 rule_id = "37b0816d-af40-40b4-885f-bb162b3c88a9" severity = "low" tags = ["Elastic", "Host", "Linux", "Threat Detection", "ML"] type = "machine_learning" [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1547" name = "Boot or Logon Autostart Execution" reference = "https://attack.mitre.org/techniques/T1547/" [[rule.threat.technique.subtechnique]] id = "T1547.006" name = "Kernel Modules and Extensions" reference = "https://attack.mitre.org/techniques/T1547/006/" [rule.threat.tactic] id = "TA0003" name = "Persistence" reference = "https://attack.mitre.org/tactics/TA0003/"