Base16 or Base32 Encoding/Decoding Activity
Adversaries may encode/decode data in an attempt to evade detection by host- or network-based security controls.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/04/17"
3integration = ["endpoint"]
4maturity = "production"
5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6min_stack_version = "8.3.0"
7updated_date = "2023/06/22"
8
9[rule]
10author = ["Elastic"]
11description = "Adversaries may encode/decode data in an attempt to evade detection by host- or network-based security controls."
12false_positives = [
13 """
14 Automated tools such as Jenkins may encode or decode files as part of their normal behavior. These events can be
15 filtered by the process executable or username values.
16 """,
17]
18from = "now-9m"
19index = ["auditbeat-*", "logs-endpoint.events.*", "endgame-*"]
20language = "kuery"
21license = "Elastic License v2"
22name = "Base16 or Base32 Encoding/Decoding Activity"
23risk_score = 21
24rule_id = "debff20a-46bc-4a4d-bae5-5cdd14222795"
25severity = "low"
26tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Data Source: Elastic Endgame", "Data Source: Elastic Defend"]
27timestamp_override = "event.ingested"
28type = "query"
29
30query = '''
31event.category:process and host.os.type:linux and event.type:(start or process_started) and
32 process.name:(base16 or base32 or base32plain or base32hex)
33'''
34
35
36[[rule.threat]]
37framework = "MITRE ATT&CK"
38[[rule.threat.technique]]
39id = "T1027"
40name = "Obfuscated Files or Information"
41reference = "https://attack.mitre.org/techniques/T1027/"
42
43[[rule.threat.technique]]
44id = "T1140"
45name = "Deobfuscate/Decode Files or Information"
46reference = "https://attack.mitre.org/techniques/T1140/"
47
48
49[rule.threat.tactic]
50id = "TA0005"
51name = "Defense Evasion"
52reference = "https://attack.mitre.org/tactics/TA0005/"
Related rules
- Attempt to Disable Syslog Service
- Creation of Hidden Shared Object File
- File made Immutable by Chattr
- Kernel Module Removal
- Potential Disabling of SELinux