Rule Library

Sigma Rules

380 rules found for "oscd.community"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Binary Padding - Linux

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

Linuxauditd
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+1Tue Oct 13linux
Detectionmediumtest

File Time Attribute Change - Linux

Detect file time attribute change to hide new or changes to existing files.

Linuxauditd
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Remove Immutable File Attribute - Auditd

Detects removing immutable file attribute.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowstable

Overwriting the File with Dev Zero or Null

Detects overwriting (effectively wiping/deleting) of a file.

Linuxauditd
TA0040 · ImpactT1485 · Data Destruction
Jakob Weinzettl+1Wed Oct 23linux
Detectionlowtest

File or Folder Permissions Change

Detects file and folder permission changes.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionhightest

Credentials In Files - Linux

Detecting attempts to extract passwords with grep

Linuxauditd
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Masquerading as Linux Crond Process

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Linuxauditd
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Network Sniffing - Linux

Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

Linuxauditd
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+1Mon Oct 21linux
Detectionmediumtest

Suspicious History File Operations - Linux

Detects commandline operations on shell history files

Linuxauditd
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17linux
Detectionlowtest

Service Reload or Start - Linux

Detects the start, reload or restart of a service.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Jakob Weinzettl+2Mon Sep 23linux
Detectioninformationaltest

System Shutdown/Reboot - Linux

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

Linuxauditd
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+1Thu Oct 15linux
Detectionlowtest

System Owner or User Discovery - Linux

Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc. Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Linuxauditd
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowstable

Password Policy Discovery - Linux

Detects password policy discovery commands

Linuxauditd
TA0007 · DiscoveryT1201 · Password Policy Discovery
Ömer Günal+2Thu Oct 08linux
Detectionhightest

Auditing Configuration Changes on Linux Host

Detect changes in auditd configuration files

Linuxauditd
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
Mikhail Larin+1Fri Oct 25linux
Detectionhightest

Modification of ld.so.preload

Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.006 · Dynamic Linker Hijacking
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24linux
Detectionhightest

Logging Configuration Changes on Linux Host

Detect changes of syslog daemons configuration files

Linuxauditd
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
Mikhail Larin+1Fri Oct 25linux
Detectioninformationalstable

System and Hardware Information Discovery

Detects system information discovery commands

Linuxauditd
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionlowtest

Linux Network Service Scanning - Auditd

Detects enumeration of local or remote network services.

Linuxauditd
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+1Wed Oct 21linux
Detectionlowtest

Split A File Into Pieces - Linux

Detection use of the command "split" to split files into parts and possible transfer.

Linuxauditd
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+1Thu Oct 15linux
Detectioncriticaltest

Webshell Remote Command Execution

Detects possible command execution by web application/web shell

Linuxauditd
TA0003 · PersistenceT1505.003 · Web Shell
Ilyas Ochkov+2Sat Oct 12linux
Detectionmediumtest

Disabling Security Tools - Builtin

Detects disabling security tools

Linuxsyslog
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionlowstable

Scheduled Task/Job At

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code

LinuxProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.002 · At
Ömer Günal+1Tue Oct 06linux
Detectionlowtest

Decode Base64 Encoded Text

Detects usage of base64 utility to decode arbitrary base64-encoded text

LinuxProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumstable

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Ömer Günal+1Wed Oct 07linux
Detectioninformationaltest

File and Directory Discovery - Linux

Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Daniil Yugoslavskiy+2Mon Oct 19linux
Detectioninformationalstable

File Deletion

Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity

LinuxProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
Ömer Günal+1Wed Oct 07linux
Detectionlowtest

Install Root Certificate

Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s

LinuxProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Ömer Günal+1Mon Oct 05linux
Detectionlowtest

Local System Accounts Discovery - Linux

Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.

LinuxProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Alejandro Ortuno+2Thu Oct 08linux
Detectionlowtest

Local Groups Discovery - Linux

Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings

LinuxProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Ömer Günal+2Sun Oct 11linux
Detectionlowtest

Linux Remote System Discovery

Detects the enumeration of other remote systems.

LinuxProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Alejandro Ortuno+1Thu Oct 22linux
Detectionmediumtest

Scheduled Cron Task/Job - Linux

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

LinuxProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06linux
Detectionlowtest

Security Software Discovery - Linux

Detects usage of system utilities (only grep and egrep for now) to discover security software discovery

LinuxProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumtest

Disabling Security Tools

Detects disabling security tools

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionlowtest

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+2Wed Oct 21linux
Detectioninformationalstable

System Information Discovery

Detects system information discovery commands

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionlowtest

System Network Connections Discovery - Linux

Detects usage of system utilities to discover system network connections

LinuxProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectioninformationaltest

System Network Discovery - Linux

Detects enumeration of local network configuration

LinuxProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Ömer Günal and remotephone+1Tue Oct 06linux
Detectionmediumtest

MacOS Emond Launch Daemon

Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege Escalationattack.t1546.014
Alejandro Ortuno+1Fri Oct 23macos
Detectionlowtest

Startup Item File Created - MacOS

Detects the creation of a startup item plist file, that automatically get executed at boot initialization to establish persistence. Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1037.005 · Startup Items
Alejandro Ortuno+1Wed Oct 14macos
Detectionmediumtest

MacOS Scripting Interpreter AppleScript

Detects execution of AppleScript of the macOS scripting language AppleScript.

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Alejandro Ortuno+1Wed Oct 21macos
Detectionlowtest

Decode Base64 Encoded Text -MacOs

Detects usage of base64 utility to decode arbitrary base64-encoded text

macOSProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Binary Padding - MacOS

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

macOSProcess Creation
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

File Time Attribute Change

Detect file time attribute change to hide new or changes to existing files

macOSProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

Indicator Removal on Host - Clear Mac System Logs

Detects deletion of local audit logs

macOSProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
remotephone+1Sun Oct 11macos
Detectionlowtest

Creation Of A Local User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

macOSProcess Creation
T1136.001 · Local AccountTA0003 · Persistence
Alejandro Ortuno+1Tue Oct 06macos
Detectionmediumtest

Hidden User Creation

Detects creation of a hidden user account on macOS (UserID < 500) or with IsHidden option

macOSProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
Daniil Yugoslavskiy+1Sat Oct 10macos
Detectionmediumtest

Credentials from Password Stores - Keychain

Detects passwords dumps from Keychain

macOSProcess Creation
TA0006 · Credential AccessT1555.001 · Keychain
Tim Ismilyaev+2Mon Oct 19macos