Files
blue-team-tools/rules/linux/lnx_pers_systemd_reload.yml
T

27 lines
770 B
YAML
Raw Normal View History

2020-02-20 23:00:16 +01:00
title: Systemd Service Reload or Start
2019-12-19 23:56:36 +01:00
id: 2625cc59-0634-40d0-821e-cb67382a3dd7
2019-10-23 11:21:19 -07:00
status: experimental
2020-09-13 22:03:04 -06:00
description: Detects a reload or a start of a service
2019-10-23 11:21:19 -07:00
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
2020-09-13 22:03:04 -06:00
references:
- https://attack.mitre.org/techniques/T1543/002/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1543.002/T1543.002.yaml
2019-10-23 11:21:19 -07:00
logsource:
product: linux
2019-11-29 09:34:08 +01:00
service: auditd
2019-10-23 11:21:19 -07:00
detection:
2019-11-29 09:34:08 +01:00
selection:
type: 'EXECVE'
2019-12-02 02:54:13 +01:00
a0|contains: 'systemctl'
a1|contains:
2019-11-29 09:34:08 +01:00
- 'daemon-reload'
- 'start'
condition: selection
2019-10-23 11:21:19 -07:00
falsepositives:
- Installation of legitimate service
2020-01-19 22:34:16 +01:00
- Legitimate reconfiguration of service
2019-10-23 11:21:19 -07:00
level: low
2020-09-13 22:03:04 -06:00
tags:
- attack.persistence
- attack.t1543.002