Detectionmediumtest
Suspicious History File Operations - Linux
Detects commandline operations on shell history files
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Mikhail Larin, oscd.communityCreated Sat Oct 17Updated Mon Nov 28eae8ce9f-bde9-47a6-8e79-f20d18419910linux
Log Source
Linuxauditd
ProductLinux← raw: linux
Serviceauditd← raw: auditd
Detection Logic
Detection Logic2 selectors
detection:
execve:
type: EXECVE
history:
- '.bash_history'
- '.zsh_history'
- '.zhistory'
- '.history'
- '.sh_history'
- 'fish_history'
condition: execve and historyFalse Positives
Legitimate administrative activity
Legitimate software, cleaning hist file
References
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
eae8ce9f-bde9-47a6-8e79-f20d18419910
Status
test
Level
medium
Type
Detection
Created
Sat Oct 17
Modified
Mon Nov 28
Author
Path
rules/linux/auditd/execve/lnx_auditd_susp_histfile_operations.yml
Raw Tags
attack.credential-accessattack.t1552.003