Skip to content

Commit ef1fa94

Browse files
[New BBR] Suspicious Clipboard Activity (#2970)
* [New BBR] Suspicious Clipboard Activity * Added new line to end of file * Update rules_building_block/collection_linux_suspicious_clipboard_activity.toml Co-authored-by: Justin Ibarra <[email protected]> * Update rules_building_block/collection_linux_suspicious_clipboard_activity.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]>
1 parent a7ff449 commit ef1fa94

File tree

1 file changed

+52
-0
lines changed

1 file changed

+52
-0
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
[metadata]
2+
creation_date = "2023/07/27"
3+
integration = ["endpoint"]
4+
maturity = "production"
5+
min_stack_comments = "Multiple field support in the New Terms rule type was added in Elastic 8.6"
6+
min_stack_version = "8.6.0"
7+
updated_date = "2023/07/27"
8+
9+
[rule]
10+
author = ["Elastic"]
11+
description = """
12+
This rule monitors for the usage of the most common clipboard utilities on unix systems by an uncommon process group
13+
leader. Adversaries may collect data stored in the clipboard from users copying information within or between
14+
applications.
15+
"""
16+
from = "now-119m"
17+
interval = "60m"
18+
index = ["logs-endpoint.events.*"]
19+
language = "kuery"
20+
license = "Elastic License v2"
21+
name = "Potential Suspicious Clipboard Activity Detected"
22+
risk_score = 21
23+
rule_id = "884e87cc-c67b-4c90-a4ed-e1e24a940c82"
24+
severity = "low"
25+
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Collection", "Rule Type: BBR"]
26+
type = "new_terms"
27+
building_block_type = "default"
28+
query = '''
29+
event.category:process and host.os.type:"linux" and event.action:"exec" and event.type:"start" and
30+
process.name:("xclip" or "xsel" or "wl-clipboard" or "clipman" or "copyq")
31+
'''
32+
33+
[[rule.threat]]
34+
framework = "MITRE ATT&CK"
35+
36+
[[rule.threat.technique]]
37+
id = "T1115"
38+
name = "Clipboard Data"
39+
reference = "https://attack.mitre.org/techniques/T1115/"
40+
41+
[rule.threat.tactic]
42+
id = "TA0009"
43+
name = "Collection"
44+
reference = "https://attack.mitre.org/tactics/TA0009/"
45+
46+
[rule.new_terms]
47+
field = "new_terms_fields"
48+
value = ["host.id", "process.group_leader.executable"]
49+
50+
[[rule.new_terms.history_window_start]]
51+
field = "history_window_start"
52+
value = "now-7d"

0 commit comments

Comments
 (0)