security_content icon indicating copy to clipboard operation
security_content copied to clipboard

linux_auditd_detection

Open tccontre opened this issue 6 months ago • 0 comments

Details

What does this PR have in it? Screenshots are worth 1000 words 😄

  • [x] linux_auditd_add_user_account.yml
  • [x] linux_auditd_at_application_execution.yml
  • [x] linux_auditd_change_file_owner_to_root.yml
  • [x] linux_auditd_clipboard_data_copy.yml
  • [x] linux_auditd_data_destruction_command.yml
  • [x] linux_auditd_dd_file_overwrite.yml
  • [x] linux_auditd_doas_conf_file_creation.yml
  • [x] linux_auditd_doas_tool_execution.yml
  • [x] linux_auditd_service_restarted.yml
  • [x] linux_auditd_stop_services.yml
  • [x] linux_auditd_edit_cron_table_parameter.yml
  • [x] linux_auditd_possible_append_cronjob_entry_on_existing_cronjob_file.yml
  • [x] linux_auditd_sudo_or_su_execution.yml
  • [x] linux_auditd_hardware_addition_swapoff.yml
  • [x] linux_auditd_insert_kernel_module_using_insmod_utility.yml
  • [x] linux_auditd_install_kernel_module_using_modprobe_utility.yml
  • [x] linux_auditd_kernel_module_enumeration.yml
  • [x] linux_auditd_nopasswd_entry_in_sudoers_file.yml
  • [x] linux_auditd_setuid_using_chmod_utility.yml
  • [x] linux_auditd_shred_overwrite_command.yml
  • [x] linux_auditd_possible_access_or_modification_of_sshd_config_file.yml
  • [x] linux_auditd_possible_access_to_credential_files.yml
  • [x] linux_auditd_possible_access_to_sudoers_file.yml
  • [x] linux_auditd_preload_hijack_library_calls.yml
  • [x] linux_auditd_setuid_using_setcap_utility.yml
  • [x] linux_auditd_add_user_account_type.yml
  • [x] linux_auditd_auditd_service_stop.yml
  • [x] linux_auditd_service_started.yml
  • [x] linux_auditd_sysmon_service_stop.yml
  • [x] linux_auditd_whoami_user_discovery.yml
  • [x] linux_auditd_data_transfer_size_limits_via_split.yml
  • [x] linux_auditd_data_transfer_size_limits_via_split_syscall.yml
  • [x] linux_auditd_kernel_module_using_rmmod_utility.yml
  • [x] linux_auditd_osquery_service_stop.yml
  • [x] linux_auditd_preload_hijack_via_preload_file.yml
  • [x] linux_auditd_file_and_directory_discovery.yml
  • [x] linux_auditd_file_permission_modification_via_chmod.yml
  • [x] linux_auditd_file_permissions_modification_via_chattr.yml
  • [x] linux_auditd_unix_shell_configuration_modification.yml
  • [x] linux_auditd_unload_module_via_modprobe.yml
  • [x] linux_auditd_base64_decode_files.yml
  • [x] linux_auditd_database_file_and_directory_discovery.yml
  • [x] linux_auditd_disable_or_modify_system_firewall.yml
  • [x] linux_auditd_find_credentials_from_password_managers.yml
  • [x] linux_auditd_find_credentials_from_password_stores.yml
  • [x] linux_auditd_find_private_keys.yml
  • [x] linux_auditd_find_ssh_private_keys.yml
  • [x] linux_auditd_hidden_files_and_directories_creation.yml
  • [x] linux_auditd_system_network_configuration_discovery.yml
  • [x] linux_auditd_virtual_disk_file_and_directory_discovery.yml

MACRO

  • [x] linux_auditd.yml
  • [x] linux_auditd_normalized_execve_process.yml
  • [x] inux_auditd_normalized_proctitle_process.yml

story

  • [x] stories/compromised_linux_host.yml

Checklist

  • [ ] Validate name matches <platform>_<mitre att&ck technique>_<short description> nomenclature
  • [ ] CI/CD jobs passed ✔️
  • [ ] Validated SPL logic.
  • [ ] Validated tags, description, and how to implement.
  • [ ] Verified references match analytic.
  • [ ] Confirm updates to lookups are handled properly.

Notes For Submitters and Reviewers

  • If you're submitting a PR from a fork, ensuring the box to allow updates from maintainers is checked will help speed up the process of getting it merged.
  • Checking the output of the build CI job when it fails will likely show an error about what is failing. You may have a very descriptive error of the specific field(s) in the specific file(s) that is causing an issue. In some cases, its also possible there is an issue with the YAML. Many of these can be caught with the pre-commit hooks if you set them up. These errors will be less descriptive as to what exactly is wrong, but will give you a column and row position in a specific file where the YAML processing breaks. If you're having trouble with this, feel free to add a comment to your PR tagging one of the maintainers and we'll be happy to help troubleshoot it.
  • Updates to existing lookup files can be tricky, because of how Splunk handles application updates and the differences between existing lookup files being updated vs new lookups. You can read more here but the short version is that any changes to lookup files need to bump the datestamp in the lookup CSV filename, and the reference to it in the YAML needs to be updated.

tccontre avatar Aug 09 '24 08:08 tccontre