Suspicious History File Operations - Linux
Detects commandline operations on shell history files
Sigma rule (View on GitHub)
1title: Suspicious History File Operations - Linux
2id: eae8ce9f-bde9-47a6-8e79-f20d18419910
3status: test
4description: 'Detects commandline operations on shell history files'
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
7author: 'Mikhail Larin, oscd.community'
8date: 2020-10-17
9modified: 2022-11-28
10tags:
11 - attack.credential-access
12 - attack.t1552.003
13logsource:
14 product: linux
15 service: auditd
16detection:
17 execve:
18 type: EXECVE
19 history:
20 - '.bash_history'
21 - '.zsh_history'
22 - '.zhistory'
23 - '.history'
24 - '.sh_history'
25 - 'fish_history'
26 condition: execve and history
27fields:
28 - a0
29 - a1
30 - a2
31 - a3
32 - key
33falsepositives:
34 - Legitimate administrative activity
35 - Legitimate software, cleaning hist file
36level: medium
References
Related rules
- Cisco Show Commands Input
- Suspicious History File Operations
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- ADCS Certificate Template Configuration Vulnerability