: Linux Artifacts
Focus
Focus

Linux Artifacts

Table of Contents

Linux Artifacts

The following table provides field names and related information for Linux artifacts.
Field Name
Artifact Type as it Appears on AutoFocus Web Portal
Field Type
Acceptable Values and Examples
sample.tasks.elf_suspicious_behaviorLinux Suspicious Behavior
StringProx
Suspicious behavior from an Linux file based on static analysis.
Example:
sample contains hard-coded malicious IP address
sample.tasks.elf_functionsLinux Functions
StringProx
Function contained in the Linux file.
Example:
__libc_sigaction
sample.tasks.elf_commandsLinux Commands
StringProx
Command contained in the Linux file.
Example:
rm -rf /var/log/wtmp
sample.tasks.elf_file_pathsLinux File Paths
StringProx
File path contained in an Linux file.
Example:
/var/run
sample.tasks.elf_ip_addressLinux IP Address
StringProx
An IP address detected during Linux sample analysis.
sample.tasks.elf_domainsLinux Domains
StringProx
Domain detected during Linux sample analysis.
Example:
run.work.
sample.tasks.elf_urlLinux URLs
StringProx
URL detected during Linux sample analysis.
Example:
http://208.67.1.59/bins.sh.
sample.tasks.elf_command_actionLinux Command Action
StringProx
Command actions embedded into Linux sample file.
Example:
/usr/bin/pusjcgkdgq gnome-terminal 739
sample.tasks.elf_file_activityLinux File Activity
StringProx
Files that showed activity as a result of the sample being executed in the WildFire analysis environment. Artifacts listed for each file activity include the parent process that showed activity, the action the parent process performed, and the file that was altered (created, modified, duplicated, or deleted).
Example:
unlink , /usr/bin/pusjcgkdgq
sample.tasks.elf_suspicious_actionLinux Suspicious Action
StringProx
An action that the Linux file performed with it was executed in the WildFire analysis environment.
Example:
Sample accesses network information or configuration , /proc/net/tcp