Skip to content

Commit 349b2a4

Browse files
tweak
1 parent 0efa2f7 commit 349b2a4

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

playbook/dev/sigma/1182f3b3-e716-4efa-99ab-d2685d04360f.yaml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ questions:
1818

1919
- question: What are the full details of this history deletion event?
2020
context: |
21-
Start by understanding exactly what triggered this alert - which history file was deleted, by whom, and how. This helps determine if it's routine maintenance or unauthorized activity. The deletion method (rm vs shred) can indicate intent.
21+
Review the alert details to understand which history file was deleted and how. The deletion method (rm vs shred) can indicate intent.
2222
answer_sources:
2323
- alert
2424
query: |
@@ -40,7 +40,7 @@ questions:
4040
4141
- question: Is history deletion normal for this user?
4242
context: |
43-
Historical patterns show whether this is unusual behavior. A developer who regularly cleans history files as part of their workflow differs from a service account suddenly deleting logs. Look for frequency and consistency - is this a monthly habit or a one-time event?
43+
Check if this user has deleted history files before to determine if this is normal behavior or unusual activity.
4444
range: -30d
4545
answer_sources:
4646
- process_creation
@@ -72,7 +72,7 @@ questions:
7272
7373
- question: Does the timing align with legitimate maintenance windows?
7474
context: |
75-
Timing helps assess intent. Automated cleanup scripts typically run at consistent times, while manual deletions during odd hours need closer inspection. Consider both the day of week and time of day - weekend maintenance is common, but 3am deletions on a Tuesday might indicate unauthorized access.
75+
Automated cleanup typically runs at consistent times while manual deletions during odd hours are more suspicious.
7676
range: -7d
7777
answer_sources:
7878
- process_creation
@@ -104,7 +104,7 @@ questions:
104104
105105
- question: Is this part of a system cleanup script or tool?
106106
context: |
107-
The parent process reveals whether this deletion was automated or manual. Legitimate cleanup often comes from cron jobs, configuration management tools like Ansible, or privacy utilities. Manual deletion from an interactive shell session requires more scrutiny, especially if preceded by suspicious commands.
107+
The parent process reveals if this was automated (cron, Ansible) or manual deletion. Manual deletion from a shell requires more scrutiny.
108108
range: -1h
109109
answer_sources:
110110
- process_creation
@@ -130,7 +130,7 @@ questions:
130130

131131
- question: What other commands did this user run before the deletion?
132132
context: |
133-
The commands preceding history deletion often show intent. Look for reconnaissance activities, privilege escalation attempts, or data access that someone might want to hide. Normal development work or system administration tasks followed by cleanup suggests legitimate use.
133+
Commands before deletion reveal intent - look for reconnaissance or data access someone might want to hide.
134134
range: -30m
135135
answer_sources:
136136
- process_creation
@@ -152,7 +152,7 @@ questions:
152152
153153
- question: Were multiple history files or other logs deleted?
154154
context: |
155-
The scope of deletion activity is telling. A single .bash_history removal might be accidental or routine, but systematic deletion of multiple history files, auth logs, and system logs indicates deliberate anti-forensics. Watch for patterns like clearing bash, zsh, and fish histories in sequence.
155+
Single file deletion may be routine, but systematic deletion of multiple logs indicates deliberate anti-forensics.
156156
range: -15m/+15m
157157
answer_sources:
158158
- process_creation
@@ -184,7 +184,7 @@ questions:
184184
185185
- question: How did the user gain access to this system?
186186
context: |
187-
Authentication context helps establish legitimacy. A user logging in from their usual workstation IP is different from access through a compromised service account or unusual SSH source. Check for authentication anomalies like new source IPs, unusual times, or privilege escalation shortly after login.
187+
Check how the user authenticated - unusual sources or times combined with history deletion increase suspicion.
188188
range: -2h
189189
answer_sources:
190190
- process_creation
@@ -214,7 +214,7 @@ questions:
214214
215215
- question: What file operations occurred after the deletion?
216216
context: |
217-
Post-deletion activity reveals whether this was a one-time cleanup or part of ongoing malicious activity. Quick logout after deletion might indicate hit-and-run tactics, while continued reconnaissance or lateral movement suggests active compromise. Normal work resuming after deletion often indicates legitimate use.
217+
Activity after deletion shows intent - immediate logout suggests covering tracks while normal work resuming indicates legitimate use.
218218
range: +30m
219219
answer_sources:
220220
- process_creation
@@ -239,7 +239,7 @@ questions:
239239

240240
- question: Were any network connections made around this time?
241241
context: |
242-
Network connections can indicate data exfiltration or command and control activity. External connections to unusual ports or IPs around the time of history deletion suggest someone hiding evidence of data theft. Internal connections might indicate lateral movement attempts after gaining initial access.
242+
External connections near history deletion may indicate data exfiltration. Internal connections suggest lateral movement.
243243
range: -30m/+30m
244244
answer_sources:
245245
- network_connection
@@ -262,7 +262,7 @@ questions:
262262
263263
- question: Were sensitive files accessed before the deletion?
264264
context: |
265-
File access patterns before history deletion can show what someone was trying to hide. Check for access to SSH keys, cloud credentials, password files, or business data. Sensitive file access followed by history deletion often indicates malicious activity.
265+
Check if sensitive files (SSH keys, credentials, passwords) were accessed before deletion - this combination often indicates malicious activity.
266266
range: -1h
267267
answer_sources:
268268
- file_event
@@ -293,7 +293,7 @@ questions:
293293
294294
- question: Has this deletion pattern occurred on other systems?
295295
context: |
296-
Checking for similar activity across your environment helps determine if you're dealing with an isolated incident or a broader campaign. Attackers often use consistent techniques across multiple compromised systems. Finding the same deletion patterns on other hosts indicates systematic activity requiring immediate response.
296+
Similar deletion patterns on multiple systems indicate a campaign rather than an isolated incident.
297297
range: -24h
298298
answer_sources:
299299
- process_creation
@@ -328,7 +328,7 @@ questions:
328328

329329
- question: Were any anti-forensics tools or techniques used?
330330
context: |
331-
Attackers often use multiple anti-forensics techniques to hide their tracks. Beyond simple deletion, look for secure wiping tools like shred or dd, timestamp manipulation to hide file changes, or attempts to clear other system logs. The cleanup methods used can indicate the attacker's skill level.
331+
Look for advanced cleanup like shred, timestamp manipulation, or clearing multiple logs - these indicate sophisticated attackers.
332332
range: -2h/+2h
333333
answer_sources:
334334
- process_creation
@@ -363,7 +363,7 @@ questions:
363363
364364
- question: Were any privilege escalation attempts made?
365365
context: |
366-
Privilege escalation often precedes anti-forensics activities since elevated permissions are needed to clear certain logs. Look for sudo commands, exploitation of setuid binaries, or kernel exploits in the hours before history deletion. A regular user suddenly gaining root access and then deleting history files indicates likely compromise.
366+
Privilege escalation before history deletion is highly suspicious since elevated permissions are needed to clear certain logs.
367367
range: -4h
368368
answer_sources:
369369
- process_creation

0 commit comments

Comments
 (0)