You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: playbook/dev/sigma/1182f3b3-e716-4efa-99ab-d2685d04360f.yaml
+13-13Lines changed: 13 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ questions:
18
18
19
19
- question: What are the full details of this history deletion event?
20
20
context: |
21
-
Start by understanding exactly what triggered this alert - which history file was deleted, by whom, and how. This helps determine if it's routine maintenance or unauthorized activity. The deletion method (rm vs shred) can indicate intent.
21
+
Review the alert details to understand which history file was deletedand how. The deletion method (rm vs shred) can indicate intent.
22
22
answer_sources:
23
23
- alert
24
24
query: |
@@ -40,7 +40,7 @@ questions:
40
40
41
41
- question: Is history deletion normal for this user?
42
42
context: |
43
-
Historical patterns show whether this is unusual behavior. A developer who regularly cleans history files as part of their workflow differs from a service account suddenly deleting logs. Look for frequency and consistency - is this a monthly habit or a one-time event?
43
+
Check if this user has deleted history files before to determine if this is normal behavior or unusual activity.
44
44
range: -30d
45
45
answer_sources:
46
46
- process_creation
@@ -72,7 +72,7 @@ questions:
72
72
73
73
- question: Does the timing align with legitimate maintenance windows?
74
74
context: |
75
-
Timing helps assess intent. Automated cleanup scripts typically run at consistent times, while manual deletions during odd hours need closer inspection. Consider both the day of week and time of day - weekend maintenance is common, but 3am deletions on a Tuesday might indicate unauthorized access.
75
+
Automated cleanup typically runs at consistent times while manual deletions during odd hours are more suspicious.
76
76
range: -7d
77
77
answer_sources:
78
78
- process_creation
@@ -104,7 +104,7 @@ questions:
104
104
105
105
- question: Is this part of a system cleanup script or tool?
106
106
context: |
107
-
The parent process reveals whether this deletion was automated or manual. Legitimate cleanup often comes from cron jobs, configuration management tools like Ansible, or privacy utilities. Manual deletion from an interactive shell session requires more scrutiny, especially if preceded by suspicious commands.
107
+
The parent process reveals if this was automated (cron, Ansible) or manual deletion. Manual deletion from a shell requires more scrutiny.
108
108
range: -1h
109
109
answer_sources:
110
110
- process_creation
@@ -130,7 +130,7 @@ questions:
130
130
131
131
- question: What other commands did this user run before the deletion?
132
132
context: |
133
-
The commands preceding history deletion often show intent. Look for reconnaissance activities, privilege escalation attempts, or data access that someone might want to hide. Normal development work or system administration tasks followed by cleanup suggests legitimate use.
133
+
Commands before deletion reveal intent - look for reconnaissance or data access someone might want to hide.
134
134
range: -30m
135
135
answer_sources:
136
136
- process_creation
@@ -152,7 +152,7 @@ questions:
152
152
153
153
- question: Were multiple history files or other logs deleted?
154
154
context: |
155
-
The scope of deletion activity is telling. A single .bash_history removal might be accidental or routine, but systematic deletion of multiple history files, auth logs, and system logs indicates deliberate anti-forensics. Watch for patterns like clearing bash, zsh, and fish histories in sequence.
155
+
Single file deletion may be routine, but systematic deletion of multiple logsindicates deliberate anti-forensics.
156
156
range: -15m/+15m
157
157
answer_sources:
158
158
- process_creation
@@ -184,7 +184,7 @@ questions:
184
184
185
185
- question: How did the user gain access to this system?
186
186
context: |
187
-
Authentication context helps establish legitimacy. A user logging in from their usual workstation IP is different from access through a compromised service account or unusual SSH source. Check for authentication anomalies like new source IPs, unusual times, or privilege escalation shortly after login.
187
+
Check how the user authenticated - unusual sources or times combined with history deletion increase suspicion.
188
188
range: -2h
189
189
answer_sources:
190
190
- process_creation
@@ -214,7 +214,7 @@ questions:
214
214
215
215
- question: What file operations occurred after the deletion?
216
216
context: |
217
-
Post-deletion activity reveals whether this was a one-time cleanup or part of ongoing malicious activity. Quick logout after deletion might indicate hit-and-run tactics, while continued reconnaissance or lateral movement suggests active compromise. Normal work resuming after deletion often indicates legitimate use.
217
+
Activity after deletion shows intent - immediate logout suggests covering tracks while normal work resuming indicates legitimate use.
218
218
range: +30m
219
219
answer_sources:
220
220
- process_creation
@@ -239,7 +239,7 @@ questions:
239
239
240
240
- question: Were any network connections made around this time?
241
241
context: |
242
-
Network connections can indicate data exfiltration or command and control activity. External connections to unusual ports or IPs around the time of history deletion suggest someone hiding evidence of data theft. Internal connections might indicate lateral movement attempts after gaining initial access.
242
+
External connections near history deletion may indicate data exfiltration. Internal connections suggest lateral movement.
243
243
range: -30m/+30m
244
244
answer_sources:
245
245
- network_connection
@@ -262,7 +262,7 @@ questions:
262
262
263
263
- question: Were sensitive files accessed before the deletion?
264
264
context: |
265
-
File access patterns before history deletion can show what someone was trying to hide. Check for access to SSH keys, cloud credentials, password files, or business data. Sensitive file access followed by history deletion often indicates malicious activity.
265
+
Check if sensitive files (SSH keys, credentials, passwords) were accessed before deletion - this combination often indicates malicious activity.
266
266
range: -1h
267
267
answer_sources:
268
268
- file_event
@@ -293,7 +293,7 @@ questions:
293
293
294
294
- question: Has this deletion pattern occurred on other systems?
295
295
context: |
296
-
Checking for similar activity across your environment helps determine if you're dealing with an isolated incident or a broader campaign. Attackers often use consistent techniques across multiple compromised systems. Finding the same deletion patterns on other hosts indicates systematic activity requiring immediate response.
296
+
Similar deletion patterns on multiple systems indicate a campaign rather than an isolated incident.
297
297
range: -24h
298
298
answer_sources:
299
299
- process_creation
@@ -328,7 +328,7 @@ questions:
328
328
329
329
- question: Were any anti-forensics tools or techniques used?
330
330
context: |
331
-
Attackers often use multiple anti-forensics techniques to hide their tracks. Beyond simple deletion, look for secure wiping tools like shred or dd, timestamp manipulation to hide file changes, or attempts to clear other system logs. The cleanup methods used can indicate the attacker's skill level.
331
+
Look for advanced cleanup like shred, timestamp manipulation, or clearing multiple logs - these indicate sophisticated attackers.
332
332
range: -2h/+2h
333
333
answer_sources:
334
334
- process_creation
@@ -363,7 +363,7 @@ questions:
363
363
364
364
- question: Were any privilege escalation attempts made?
365
365
context: |
366
-
Privilege escalation often precedes anti-forensics activities since elevated permissions are needed to clear certain logs. Look for sudo commands, exploitation of setuid binaries, or kernel exploits in the hours before history deletion. A regular user suddenly gaining root access and then deleting history files indicates likely compromise.
366
+
Privilege escalation before history deletion is highly suspicious since elevated permissions are needed to clear certain logs.
0 commit comments