Detectionlowtest
System Information Discovery - Auditd
Detects System Information Discovery commands
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Linuxauditd
ProductLinux← raw: linux
Serviceauditd← raw: auditd
Detection Logic
Detection Logic4 selectors
detection:
selection_1:
type: PATH
name:
- /etc/lsb-release
- /etc/redhat-release
- /etc/issue
selection_2:
type: EXECVE
a0:
- uname
- uptime
- lsmod
- hostname
- env
selection_3:
type: EXECVE
a0: grep
a1|contains:
- vbox
- vm
- xen
- virtio
- hv
selection_4:
type: EXECVE
a0: kmod
a1: list
condition: 1 of selection_*False Positives
Likely
References
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
f34047d9-20d3-4e8b-8672-0a35cc50dc71
Status
test
Level
low
Type
Detection
Created
Fri Sep 03
Modified
Mon Mar 06
Author
Path
rules/linux/auditd/lnx_auditd_system_info_discovery.yml
Raw Tags
attack.discoveryattack.t1082