rules/_deprecated/persistence_cron_jobs_creation_and_runtime.toml (50 lines of code) (raw):

[metadata] creation_date = "2021/01/15" deprecation_date = "2021/04/15" maturity = "deprecated" updated_date = "2021/04/15" [rule] author = ["Elastic"] description = """ Identifies the creation or execution of a cron job. Adversaries may abuse cron jobs to perform task scheduling for initial or recurring execution of malicious code. """ false_positives = ["Legitimate software or scripts using cron jobs for recurring tasks."] from = "now-9m" index = ["auditbeat-*", "logs-endpoint.events.*"] language = "kuery" license = "Elastic License v2" name = "Potential Persistence via Cron Job" references = ["https://archive.f-secure.com/weblog/archives/00002576.html", "https://ss64.com/osx/crontab.html"] risk_score = 21 rule_id = "b1c14366-f4f8-49a0-bcbb-51d2de8b0bb8" severity = "low" tags = ["Elastic", "Host", "Linux", "macOS", "Threat Detection", "Persistence"] timestamp_override = "event.ingested" type = "query" query = ''' event.category:process and event.type:(start or process_started or info) and not user.name:root and ((process.name:crontab and not process.args:("-l" or "-r" or "-e" or "-help" or "-h")) or (process.parent.name:cron and not process.name:"running job" and not process.executable:(/Applications/Docker.app/Contents/Resources/bin/docker or /usr/bin/killall or /usr/sbin/sendmail or /usr/bin/env or /usr/bin/timeshift or /bin/rm))) ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1053" name = "Scheduled Task/Job" reference = "https://attack.mitre.org/techniques/T1053/" [[rule.threat.technique.subtechnique]] id = "T1053.003" name = "Cron" reference = "https://attack.mitre.org/techniques/T1053/003/" [rule.threat.tactic] id = "TA0003" name = "Persistence" reference = "https://attack.mitre.org/tactics/TA0003/"