SigmaHQ/rules/linux/lnx_system_network_discovery.yml

28 lines
796 B
YAML
Raw Normal View History

title: System Network Discovery - Linux
id: e7bd1cfa-b446-4c88-8afb-403bcd79e3fa
2020-10-08 04:02:03 +00:00
status: experimental
description: Detects enumeration of local network configuration
2020-10-08 04:02:03 +00:00
author: remotephone, oscd.community
date: 2020/10/06
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1016/T1016.md
logsource:
category: process_creation
2020-10-08 04:02:03 +00:00
product: unix
detection:
selection:
ProcessName:
- '/usr/bin/firewall-cmd'
- '/usr/sbin/ufw'
- '/usr/sbin/iptables'
- '/usr/bin/netstat'
- '/usr/bin/ss'
- '/usr/sbin/ip'
- '/usr/sbin/ifconfig'
condition: selection
2020-10-08 04:02:03 +00:00
falsepositives:
- Legitimate administration activities
level: low
tags:
- attack.discovery
- attack.t1016