DET0231 Behavioral Detection of Systemd Timer Abuse for Scheduled Execution
| Item |
Value |
| ID |
DET0231 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1053.006 (Systemd Timers)
Analytics
Linux
AN0645
Detects adversarial abuse of systemd timers by correlating file creation/modification of .timer and .service units in system directories with the execution of abnormal child processes launched by ‘systemd’ (PID 1), especially as root.
Log Sources
Mutable Elements
| Field |
Description |
| TimerIntervalThreshold |
The interval threshold used to determine if a newly created timer is unusually frequent or immediate (e.g., < 5 minutes). |
| ParentProcessID |
Whether the child process has a parent PID of 1, indicating systemd as the invoker. Can be tuned to include known benign cases. |
| UserContext |
User under which the timer/service is created or executed (e.g., root vs. non-root). |
| TimerCreationPath |
The path where the timer or service file is created; system-wide vs. user space can be scoped. |