Suspicious C2 Activities
Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'. This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap. These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)
Sigma rule (View on GitHub)
1title: Suspicious C2 Activities
2id: f7158a64-6204-4d6d-868a-6e6378b467e0
3status: test
4description: |
5 Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'.
6 This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap.
7 These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)
8references:
9 - https://github.com/Neo23x0/auditd
10author: Marie Euler
11date: 2020-05-18
12modified: 2021-11-27
13tags:
14 - attack.command-and-control
15logsource:
16 product: linux
17 service: auditd
18detection:
19 selection:
20 key: 'susp_activity'
21 condition: selection
22falsepositives:
23 - Admin or User activity
24level: medium
References
Related rules
- ADSI-Cache File Creation By Uncommon Tool
- APT User Agent
- APT40 Dropbox Tool User Agent
- Activity from Anonymous IP Addresses
- Activity from Infrequent Country