heroui logo

System Information Discovery - Auditd

Sigma Rules

View Source
Summary
This rule is designed to detect commands that are commonly used for System Information Discovery on Linux systems. Specifically, it monitors the execution of certain system files and commands associated with retrieving system configuration details and environment information. The detection is implemented using the Linux audit daemon (auditd), which logs interactions with configured files and execution of commands. The rule targets the following command types and system files: selection_1 detects access to files like /etc/lsb-release and /etc/redhat-release which provide system version information; selection_2 identifies when commands such as 'uname', 'uptime', 'lsmod', and 'hostname' are executed; selection_3 captures grep commands that search for virtual machine related terms, and selection_4 looks for the execution of 'kmod list'. The condition triggered if any of these selections is met indicates potential information gathering activities by an intruder or malicious software.
Categories
  • Linux
  • Endpoint
Data Sources
  • Logon Session
  • Process
  • File
ATT&CK Techniques
  • T1082
Created: 2021-09-03