t1030 for lin/macos

This commit is contained in:
Mikhail Larin 2020-10-19 16:25:31 +03:00
parent cc2f48b4a3
commit d9fba92adf
2 changed files with 49 additions and 0 deletions

View File

@ -0,0 +1,26 @@
title: 'Split A File Into Pieces'
id: 2dad0cba-c62a-4a4f-949f-5f6ecd619769
status: experimental
description: 'Detection use of the command "split" to split files into parts and possible transfer.'
# For this rule to work execve auditing / file system auditing with "execute access" to specific binaries must be configured
# Example config (place it at the bottom of audit.rules)
# -a always,exit -F arch=b32 -S execve -k execve
# -a always,exit -F arch=b64 -S execve -k execve
author: 'Igor Fits, oscd.community'
date: 2020/10/15
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1030/T1030.md
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
comm: 'split'
condition: selection
falsepositives:
- 'Legitimate administrative activity'
level: high
tags:
- attack.defense_exfiltration
- attack.t1030

View File

@ -0,0 +1,23 @@
title: 'Split A File Into Pieces'
id: 7f2bb9d5-6395-4de5-969c-70c11fbe6b12
status: experimental
description: 'Detection use of the command "split" to split files into parts and possible transfer.'
# For this rule to work you must enable audit of process execution in OpenBSM, see
# https://osquery.readthedocs.io/en/stable/deployment/process-auditing/#macos-process-socket-auditing
author: 'Igor Fits, Mikhail Larin, oscd.community'
date: 2020/10/15
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1030/T1030.md
logsource:
product: macos
category: process_creation
detection:
selection:
ProcessName|endswith: '/split'
condition: selection
falsepositives:
- 'Legitimate administrative activity'
level: high
tags:
- attack.defense_exfiltration
- attack.t1030