Skip to content

Commit d03f6df

Browse files
committed
Reference Update [Batch 1]
1 parent beec664 commit d03f6df

File tree

125 files changed

+999
-985
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

125 files changed

+999
-985
lines changed

README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Florian wrote a short [rule creation tutorial](https://www.nextron-systems.com/2
7373

7474
## Troubles / Troubleshooting / Help
7575

76-
If you need help for a specific supported backend you can use e.g. `sigmac --backend-help elastalert-dsl`. More details on the usage of `sigmac` can be found in the dedicated [README.md](https://github.com/Neo23x0/sigma/blob/master/tools/README.md).
76+
If you need help for a specific supported backend you can use e.g. `sigmac --backend-help elastalert-dsl`. More details on the usage of `sigmac` can be found in the dedicated [README.md](https://github.com/SigmaHQ/sigma/blob/master/tools/README.md).
7777

78-
Be sure to checkout the [guidance on backend specific settings](https://github.com/Neo23x0/sigma/blob/master/tools/README.md#choosing-the-right-sigmac) for `sigmac`.
78+
Be sure to checkout the [guidance on backend specific settings](https://github.com/SigmaHQ/sigma/blob/master/tools/README.md#choosing-the-right-sigmac) for `sigmac`.
7979

8080
# Examples
8181

@@ -366,7 +366,7 @@ The content of this repository is released under the following licenses:
366366
367367
* The toolchain (everything under `tools/`) is licensed under the [GNU Lesser General Public License](https://www.gnu.org/licenses/lgpl-3.0.en.html)
368368
* The [Sigma specification](https://github.com/Neo23x0/sigma/wiki) is public domain
369-
* The rules contained in the `rules/` directory are released under the [Detection Rule License (DRL) 1.1](https://github.com/Neo23x0/sigma/blob/master/LICENSE.Detection.Rules.md)
369+
* The rules contained in the `rules/` directory are released under the [Detection Rule License (DRL) 1.1](https://github.com/SigmaHQ/sigma/blob/master/LICENSE.Detection.Rules.md)
370370
371371
# Credits
372372

contrib/sigma2sumologic.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ def get_rule_as_sumologic(file):
198198

199199
try:
200200
# Run query
201-
# https://github.com/SumoLogic/sumologic-python-sdk/blob/master/scripts/search-job.py
201+
# https://github.com/SumoLogic/sumologic-python-sdk/blob/3ad8033deb028ac45ac4099f11c04785fa426f51/scripts/search-job.py
202202
sumo = SumoLogic(args.accessid, args.accesskey, args.endpoint)
203203
toTime = datetime.datetime.now().strftime("%Y-%m-%dT%H:%M:%S")
204204
fromTime = datetime.datetime.strptime(toTime, "%Y-%m-%dT%H:%M:%S") - datetime.timedelta(hours=24)

rules-deprecated/windows/registry_event_asep_reg_keys_modification.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 17f878b8-9968-4578-b814-c4217fc5768c
33
description: Detects modification of autostart extensibility point (ASEP) in registry.
44
status: deprecated
55
references:
6-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.001/T1547.001.md
6+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md
77
- https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
88
- https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d # a list with registry keys
99
date: 2019/10/25

rules-unsupported/driver_load_invoke_obfuscation_obfuscated_iex_services.yml

+5-3
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,13 @@ id: e75c48bd-3434-4d61-94b7-ddfaa2c08487
33
related:
44
- id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9
55
type: derived
6-
description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
6+
description: Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework (See reference section for code block)
7+
references:
8+
- https://github.com/danielbohannon/Invoke-Obfuscation/blob/f20e7f843edd0a3a7716736e9eddfa423395dd26/Out-ObfuscatedStringCommand.ps1#L873-L888
79
status: unsupported
810
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
911
date: 2019/11/08
10-
modified: 2021/09/16
12+
modified: 2022/07/07
1113
tags:
1214
- attack.defense_evasion
1315
- attack.t1027
@@ -26,4 +28,4 @@ detection:
2628
condition: selection
2729
falsepositives:
2830
- Unknown
29-
level: high
31+
level: high

rules/application/ruby/appframework_ruby_on_rails_exceptions.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- http://edgeguides.rubyonrails.org/security.html
1010
- http://guides.rubyonrails.org/action_controller_overview.html
1111
- https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception
12-
- https://github.com/rails/rails/blob/master/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb
12+
- https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb
1313
logsource:
1414
category: application
1515
product: ruby_on_rails

rules/cloud/aws/aws_ec2_download_userdata.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/11
77
modified: 2021/08/20
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/ec2__download_userdata/main.py
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ec2__download_userdata/main.py
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/aws/aws_ec2_startup_script_change.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/12
77
modified: 2022/06/07
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/ec2__startup_shell_script/main.py#L9
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ec2__startup_shell_script/main.py#L9
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/aws/aws_ecs_task_definition_backdoor.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Detects when an Elastic Container Service (ECS) Task Definition has
55
author: Darin Smith
66
date: 2022/06/07
77
references:
8-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/ecs__backdoor_task_def/main.py
8+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py
99
- https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html
1010
- https://attack.mitre.org/techniques/T1525
1111
logsource:

rules/cloud/aws/aws_guardduty_disruption.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/11
77
modified: 2021/08/09
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/guardduty__whitelist_ip/main.py#L9
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/guardduty__whitelist_ip/main.py#L9
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/aws/aws_iam_backdoor_users_keys.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/12
77
modified: 2021/08/20
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/iam__backdoor_users_keys/main.py
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/iam__backdoor_users_keys/main.py
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/aws/aws_rds_change_master_password.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/12
77
modified: 2021/08/20
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/rds__explore_snapshots/main.py
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/aws/aws_rds_public_db_restore.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: faloker
66
date: 2020/02/12
77
modified: 2021/08/20
88
references:
9-
- https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/rds__explore_snapshots/main.py
9+
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
1010
logsource:
1111
product: aws
1212
service: cloudtrail

rules/cloud/azure/azure_creating_number_of_resources_detection.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Number of VM creations or deployment activities occur in Azure via the azureactivity log.
55
author: sawwinnnaung
66
references:
7-
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
7+
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
88
date: 2020/05/07
99
modified: 2021/11/27
1010
logsource:

rules/cloud/azure/azure_granting_permission_detection.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
55
author: sawwinnnaung
66
references:
7-
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/Granting_Permissions_To_Account_detection.yaml
7+
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/Granting_Permissions_To_Account_detection.yaml
88
date: 2020/05/07
99
modified: 2021/11/27
1010
logsource:

rules/cloud/azure/azure_rare_operations.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
55
author: sawwinnnaung
66
references:
7-
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/azureactivity/RareOperations.yaml
7+
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/RareOperations.yaml
88
date: 2020/05/07
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_auditing_config_change.yml

+17-17
Original file line numberDiff line numberDiff line change
@@ -4,28 +4,28 @@ status: test
44
description: Detect changes in auditd configuration files
55
author: Mikhail Larin, oscd.community
66
references:
7-
- https://github.com/Neo23x0/auditd/blob/master/audit.rules
8-
- self experience
7+
- https://github.com/Neo23x0/auditd/blob/master/audit.rules
8+
- Self Experience
99
date: 2019/10/25
1010
modified: 2021/11/27
1111
logsource:
12-
product: linux
13-
service: auditd
12+
product: linux
13+
service: auditd
1414
detection:
15-
selection:
16-
type: PATH
17-
name:
18-
- /etc/audit/*
19-
- /etc/libaudit.conf
20-
- /etc/audisp/*
21-
condition: selection
15+
selection:
16+
type: PATH
17+
name:
18+
- /etc/audit/*
19+
- /etc/libaudit.conf
20+
- /etc/audisp/*
21+
condition: selection
2222
fields:
23-
- exe
24-
- comm
25-
- key
23+
- exe
24+
- comm
25+
- key
2626
falsepositives:
27-
- Legitimate administrative activity
27+
- Legitimate administrative activity
2828
level: high
2929
tags:
30-
- attack.defense_evasion
31-
- attack.t1562.006
30+
- attack.defense_evasion
31+
- attack.t1562.006

rules/linux/auditd/lnx_auditd_binary_padding.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: 'Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.'
55
author: 'Igor Fits, oscd.community'
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1027.001/T1027.001.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027.001/T1027.001.md
88
date: 2020/10/13
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_change_file_time_attr.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: 'Detect file time attribute change to hide new or changes to existing files.'
55
author: 'Igor Fits, oscd.community'
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.006/T1070.006.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.006/T1070.006.md
88
date: 2020/10/15
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_chattr_immutable_removal.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Detects removing immutable file attribute.
55
author: Jakob Weinzettl, oscd.community
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md
88
date: 2019/09/23
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_data_compressed.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.
55
author: Timur Zinniatullin, oscd.community
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md
88
date: 2019/10/21
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_dd_delete_file.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,17 @@ description: Detects overwriting (effectively wiping/deleting) of a file.
55
author: Jakob Weinzettl, oscd.community
66
date: 2019/10/23
77
references:
8-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1485/T1485.md
8+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1485/T1485.md
99
logsource:
1010
product: linux
1111
service: auditd
1212
detection:
1313
selection:
1414
type: 'EXECVE'
15-
a0|contains: 'dd'
15+
a0|contains: 'dd'
1616
a1|contains:
17-
- 'if=/dev/null'
18-
- 'if=/dev/zero'
17+
- 'if=/dev/null'
18+
- 'if=/dev/zero'
1919
condition: selection
2020
falsepositives:
2121
- Appending null bytes to files.

rules/linux/auditd/lnx_auditd_disable_system_firewall.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: experimental
44
description: Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.
55
author: 'Pawel Mazur'
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
88
- https://attack.mitre.org/techniques/T1562/004/
99
- https://firewalld.org/documentation/man-pages/firewall-cmd.html
1010
date: 2022/01/22

rules/linux/auditd/lnx_auditd_file_or_folder_permissions.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Detects file and folder permission changes.
55
author: Jakob Weinzettl, oscd.community
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md
88
date: 2019/09/23
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_find_cred_in_files.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: 'Detecting attempts to extract passwords with grep'
55
author: 'Igor Fits, oscd.community'
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1552.001/T1552.001.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
88
date: 2020/10/15
99
modified: 2021/11/27
1010
logsource:

rules/linux/auditd/lnx_auditd_hidden_files_directories.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: 'Pawel Mazur'
55
status: experimental
66
date: 2021/09/06
77
references:
8-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.001/T1564.001.md
8+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.001/T1564.001.md
99
- https://attack.mitre.org/techniques/T1564/001/
1010
logsource:
1111
product: linux
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,35 @@
11
title: Linux Keylogging with Pam.d
22
id: 49aae26c-450e-448b-911d-b3c13d178dfc
33
description: Detect attempt to enable auditing of TTY input
4-
# -w /etc/pam.d/ -p wa -k pam - this rule will help you detect changes to the pam.d files- https://github.com/Neo23x0/auditd/blob/master/audit.rules
5-
# - the TTY events detection asumes that you do not expect them in your environment or add filtering on those users that you configured it for
4+
# -w /etc/pam.d/ -p wa -k pam - This rule will help you detect changes to the pam.d files - https://github.com/Neo23x0/auditd/blob/master/audit.rules
5+
# The TTY events detection asumes that you do not expect them in your environment or add filtering on those users that you configured it for
66
author: 'Pawel Mazur'
77
status: experimental
88
date: 2021/05/24
99
references:
10-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.001/T1056.001.md
11-
- https://attack.mitre.org/techniques/T1003/
12-
- https://linux.die.net/man/8/pam_tty_audit
13-
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing
14-
- https://access.redhat.com/articles/4409591#audit-record-types-2
10+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/T1056.001.md
11+
- https://attack.mitre.org/techniques/T1003/
12+
- https://linux.die.net/man/8/pam_tty_audit
13+
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing
14+
- https://access.redhat.com/articles/4409591#audit-record-types-2
1515
logsource:
16-
product: linux
17-
service: auditd
16+
product: linux
17+
service: auditd
1818
detection:
19-
path_events:
20-
type: PATH
21-
name:
22-
- '/etc/pam.d/system-auth'
23-
- '/etc/pam.d/password-auth'
24-
tty_events:
19+
path_events:
20+
type: PATH
21+
name:
22+
- '/etc/pam.d/system-auth'
23+
- '/etc/pam.d/password-auth'
24+
tty_events:
2525
type:
26-
- 'TTY'
27-
- 'USER_TTY'
28-
condition: path_events or tty_events
26+
- 'TTY'
27+
- 'USER_TTY'
28+
condition: path_events or tty_events
2929
tags:
30-
- attack.credential_access
31-
- attack.t1003
32-
- attack.t1056.001
30+
- attack.credential_access
31+
- attack.t1003
32+
- attack.t1056.001
3333
falsepositives:
34-
- Administrative work
34+
- Administrative work
3535
level: high

rules/linux/auditd/lnx_auditd_ld_so_preload_mod.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.
55
author: E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.006/T1574.006.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.006/T1574.006.md
88
- https://eqllib.readthedocs.io/en/latest/analytics/fd9b987a-1101-4ed3-bda6-a70300eaf57e.html
99
date: 2019/10/24
1010
modified: 2021/11/27

rules/linux/auditd/lnx_auditd_load_module_insmod.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: 'Pawel Mazur'
66
date: 2021/11/02
77
references:
88
- https://attack.mitre.org/techniques/T1547/006/
9-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.006/T1547.006.md
9+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.006/T1547.006.md
1010
- https://linux.die.net/man/8/insmod
1111
- https://man7.org/linux/man-pages/man8/kmod.8.html
1212
logsource:

rules/linux/auditd/lnx_auditd_masquerading_crond.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ status: test
44
description: Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.
55
author: Timur Zinniatullin, oscd.community
66
references:
7-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.003/T1036.003.md
7+
- https://github.com/redcanaryco/atomic-red-team/blob/8a82e9b66a5b4f4bc5b91089e9f24e0544f20ad7/atomics/T1036.003/T1036.003.md#atomic-test-2---masquerading-as-linux-crond-process
88
date: 2019/10/21
99
modified: 2021/11/27
1010
logsource:

0 commit comments

Comments
 (0)