mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
35 lines
977 B
YAML
35 lines
977 B
YAML
title: Logging Configuration Changes on Linux Host
|
|
id: c830f15d-6f6e-430f-8074-6f73d6807841
|
|
description: Detect changes of syslog daemons configuration files
|
|
# Example config for this one (place it at the top of audit.rules)
|
|
# -w /etc/syslog.conf -p wa -k etc_modify_syslogconfig
|
|
# -w /etc/rsyslog.conf -p wa -k etc_modify_rsyslogconfig
|
|
# -w /etc/syslog-ng/syslog-ng.conf -p wa -k etc_modify_syslogngconfig
|
|
references:
|
|
- self experience
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1054 # an old one
|
|
- attack.t1562.006
|
|
author: Mikhail Larin, oscd.community
|
|
status: experimental
|
|
date: 2019/10/25
|
|
logsource:
|
|
product: linux
|
|
service: auditd
|
|
detection:
|
|
selection:
|
|
type: 'PATH'
|
|
name:
|
|
- /etc/syslog.conf
|
|
- /etc/rsyslog.conf
|
|
- /etc/syslog-ng/syslog-ng.conf
|
|
condition: selection
|
|
fields:
|
|
- exe
|
|
- comm
|
|
- key
|
|
falsepositives:
|
|
- Legitimate administrative activity
|
|
level: high
|