diff --git a/rules/linux/auditd/lnx_auditd_user_discovery.yml b/rules/linux/auditd/lnx_auditd_user_discovery.yml index 0bfbbf39799..90ff5695e41 100644 --- a/rules/linux/auditd/lnx_auditd_user_discovery.yml +++ b/rules/linux/auditd/lnx_auditd_user_discovery.yml @@ -1,12 +1,14 @@ -title: System Owner or User Discovery +title: System Owner or User Discovery - Linux id: 9a0d8ca0-2385-4020-b6c6-cb6153ca56f3 status: test -description: Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. +description: | + Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc. + Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. references: - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1033/T1033.md author: Timur Zinniatullin, oscd.community date: 2019-10-21 -modified: 2021-11-27 +modified: 2024-11-30 tags: - attack.discovery - attack.t1033 @@ -17,9 +19,13 @@ detection: selection: type: 'EXECVE' a0: + - 'hostname' + - 'id' + - 'last' - 'users' - 'w' - 'who' + - 'whoami' condition: selection falsepositives: - Admin activity