Detectionhighexperimental
OpenCanary - NMAP OS Scan
Detects instances where an OpenCanary node has been targeted by a NMAP OS Scan
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
opencanaryapplication
Productopencanary← raw: opencanary
Categoryapplication← raw: application
Detection Logic
Detection Logic1 selector
detection:
selection:
logtype: 5002
condition: selectionFalse Positives
Unlikely
False positives are unlikely for most environments. High confidence detection.
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
e8a677fd-248c-4eab-94df-de2f6f645884
Status
experimental
Level
high
Type
Detection
Created
Tue Jan 06
Author
Path
rules/application/opencanary/opencanary_portscan_nmap_os_scan.yaml
Raw Tags
attack.discoveryattack.t1046