Creation of Hidden Shared Object File
Identifies the creation of a hidden shared object (.so) file. Users can mark specific files as hidden simply by putting a "." as the first character in the file or folder name. Adversaries can use this to their advantage to hide files and folders on the system for persistence and defense evasion.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2022/07/20"
3integration = ["endpoint"]
4maturity = "production"
5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6min_stack_version = "8.3.0"
7updated_date = "2023/02/22"
8
9[rule]
10author = ["Elastic"]
11description = """
12Identifies the creation of a hidden shared object (.so) file. Users can mark specific files as hidden simply by putting
13a "." as the first character in the file or folder name. Adversaries can use this to their advantage to hide files and
14folders on the system for persistence and defense evasion.
15"""
16from = "now-9m"
17index = ["auditbeat-*", "logs-endpoint.events.*", "endgame-*"]
18language = "eql"
19license = "Elastic License v2"
20max_signals = 33
21name = "Creation of Hidden Shared Object File"
22note = """## Setup
23
24If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2, events will not define `event.ingested` and default fallback for EQL rules was not added until 8.2, so you will need to add a custom pipeline to populate `event.ingested` to @timestamp for this rule to work.
25"""
26risk_score = 47
27rule_id = "766d3f91-3f12-448c-b65f-20123e9e9e8c"
28severity = "medium"
29tags = ["Elastic", "Host", "Linux", "Threat Detection", "Defense Evasion", "Elastic Endgame"]
30timestamp_override = "event.ingested"
31type = "eql"
32
33query = '''
34file where host.os.type == "linux" and event.type == "creation" and file.extension == "so" and file.name : ".*.so"
35'''
36
37
38[[rule.threat]]
39framework = "MITRE ATT&CK"
40[[rule.threat.technique]]
41id = "T1564"
42name = "Hide Artifacts"
43reference = "https://attack.mitre.org/techniques/T1564/"
44[[rule.threat.technique.subtechnique]]
45id = "T1564.001"
46name = "Hidden Files and Directories"
47reference = "https://attack.mitre.org/techniques/T1564/001/"
48
49
50
51[rule.threat.tactic]
52id = "TA0005"
53name = "Defense Evasion"
54reference = "https://attack.mitre.org/tactics/TA0005/"
Setup
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2, events will not define event.ingested
and default fallback for EQL rules was not added until 8.2, so you will need to add a custom pipeline to populate event.ingested
to @timestamp for this rule to work.