mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 01:45:21 +00:00
T1040
This commit is contained in:
parent
4a560e9375
commit
7e3d8ccaf3
29
rules/linux/auditd/lnx_network_sniffing.yml
Normal file
29
rules/linux/auditd/lnx_network_sniffing.yml
Normal file
@ -0,0 +1,29 @@
|
||||
title: Network Sniffing
|
||||
status: experimental
|
||||
description: Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
references:
|
||||
- https://attack.mitre.org/techniques/T1040/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1040/T1040.yaml
|
||||
logsource:
|
||||
product: linux
|
||||
service: auditd
|
||||
detection:
|
||||
selection1:
|
||||
type: 'execve'
|
||||
a0: 'tcpdump'
|
||||
a1: '-c'
|
||||
a3: '-nnni' # you don't need "n" three times, but ART's test is like this, they say "we don't know why, but we've seen people do that just for emphasis" ¯\_(ツ)_/¯
|
||||
selection2:
|
||||
type: 'execve'
|
||||
a0: 'tshark'
|
||||
a1: '-c'
|
||||
a3: '-i'
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Admin activity
|
||||
level: low
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.discovery
|
||||
- attack.t1040
|
Loading…
Reference in New Issue
Block a user