Files
blue-team-tools/rules/linux/lnx_system_network_discovery.yml
T

33 lines
905 B
YAML
Raw Normal View History

title: System Network Discovery - Linux
id: e7bd1cfa-b446-4c88-8afb-403bcd79e3fa
2020-10-07 23:02:03 -05:00
status: experimental
description: Detects enumeration of local network configuration
2020-10-16 22:02:58 -05:00
author: Ömer Günal and remotephone, oscd.community
2020-10-07 23:02:03 -05:00
date: 2020/10/06
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1016/T1016.md
logsource:
category: process_creation
product: linux
2020-10-07 23:02:03 -05:00
detection:
2020-10-16 22:01:44 -05:00
selection1:
Image|endswith:
2020-10-16 21:54:41 -05:00
- '/firewall-cmd'
- '/ufw'
- '/iptables'
- '/netstat'
- '/ss'
- '/ip'
- '/ifconfig'
2020-10-16 22:01:44 -05:00
- '/systemd-resolve'
- '/route'
selection2:
CommandLine|contains: '/etc/resolv.conf'
condition: selection1 or selection2
2020-10-07 23:02:03 -05:00
falsepositives:
- Legitimate administration activities
2021-04-03 00:00:43 +02:00
level: informational
2020-10-07 23:02:03 -05:00
tags:
- attack.discovery
2020-10-13 22:44:02 -05:00
- attack.t1016