SigmaHQ/rules/linux/auditd/lnx_auditd_pers_systemd_reload.yml

28 lines
772 B
YAML
Raw Normal View History

title: Systemd Service Reload or Start
id: 2625cc59-0634-40d0-821e-cb67382a3dd7
status: experimental
2021-07-06 09:39:25 +00:00
description: Detects a reload or a start of a service.
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
2020-09-14 04:03:04 +00:00
references:
- https://attack.mitre.org/techniques/T1543/002/
2021-07-06 09:39:25 +00:00
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1543.002/T1543.002.md
logsource:
product: linux
2019-11-29 08:34:08 +00:00
service: auditd
detection:
2019-11-29 08:34:08 +00:00
selection:
type: 'EXECVE'
2019-12-02 01:54:13 +00:00
a0|contains: 'systemctl'
a1|contains:
2019-11-29 08:34:08 +00:00
- 'daemon-reload'
- 'start'
condition: selection
falsepositives:
2021-07-06 09:39:25 +00:00
- Installation of legitimate service.
- Legitimate reconfiguration of service.
level: low
2020-09-14 04:03:04 +00:00
tags:
- attack.persistence
2021-07-06 09:39:25 +00:00
- attack.t1543.002