SigmaHQ/rules/linux/macos_remote_system_discovery.yml
2021-05-27 10:29:21 +02:00

49 lines
1.1 KiB
YAML

title: Macos Remote System Discovery
id: 10227522-8429-47e6-a301-f2b2d014e7ad
status: experimental
description: Detects the enumeration of other remote systems.
author: Alejandro Ortuno, oscd.community
date: 2020/10/22
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1018/T1018.md
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith:
- '/arp'
CommandLine|contains:
- '-a'
selection_2:
Image|endswith:
- '/ping'
CommandLine|contains:
- ' 10.' #10.0.0.0/8
- ' 192.168.' #192.168.0.0/16
- ' 172.16.' #172.16.0.0/12
- ' 172.17.'
- ' 172.18.'
- ' 172.19.'
- ' 172.20.'
- ' 172.21.'
- ' 172.22.'
- ' 172.23.'
- ' 172.24.'
- ' 172.25.'
- ' 172.26.'
- ' 172.27.'
- ' 172.28.'
- ' 172.29.'
- ' 172.30.'
- ' 172.31.'
- ' 127.' #127.0.0.0/8
- ' 169.254.' #169.254.0.0/16
condition: 1 of them
falsepositives:
- Legitimate administration activities
level: informational
tags:
- attack.discovery
- attack.t1018