heroui logo

File and Directory Discovery - MacOS

Sigma Rules

View Source
Summary
The detection rule titled "File and Directory Discovery - MacOS" focuses on identifying potential malicious activities on MacOS systems that involve the use of system utilities to explore files and directories. This is often indicative of reconnaissance phases in attacks, where an adversary tries to gather information about the targeted environment. The rule leverages a variety of command-line utilities such as 'file', 'ls', 'find', 'mdfind', and 'tree', each known for their capabilities to interact with the filesystem. The conditions for triggering an alert include any execution of these commands, especially when parameters like the recursive flag for 'ls' or extensive command lines are present. The rule aims to capture both specialized tools for file introspection and general commands predominantly used for directory traversal. Notably, false positives may occur due to legitimate system administration tasks that utilize these command-line tools. For effective implementation, logs from process creation events in MacOS are monitored, aiming to enhance detection of unauthorized or suspicious file operations.
Categories
  • macOS
Data Sources
  • Process
ATT&CK Techniques
  • T1083
Created: 2020-10-19