Rule Library

Sigma Rules

139 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Potential Container Discovery Via Inodes Listing

Detects listing of the inodes of the "/" directory to determine if the we are running inside of a container.

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Seth HanfordWed Aug 23linux
Detectionmediumtest

Interactive Bash Suspicious Children

Detects suspicious interactive bash as a parent to rather uncommon child processes

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.004 · Unix ShellT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionhightest

Suspicious Java Children Processes

Detects java process spawning suspicious children

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Jun 03linux
Detectionlowtest

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+2Wed Oct 21linux
Detectionmediumtest

Linux Shell Pipe to Shell

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionmediumtest

Access of Sudoers File Content

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhightest

Linux Recon Indicators

Detects events with patterns found in commands used for reconnaissance on linux systems

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client ConfigurationsTA0006 · Credential AccessT1552.001 · Credentials In Files
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Linux

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

LinuxProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0002 · ExecutionTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25linux
Detectionmediumtest

Potential Suspicious Change To Sensitive/Critical Files

Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Tue May 30linux
Detectionhightest

Shell Execution Of Process Located In Tmp Directory

Detects execution of shells from a parent process located in a temporary (/tmp) directory

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Execution Of Script Located In Potentially Suspicious Directory

Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectioninformationalstable

System Information Discovery

Detects system information discovery commands

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionlowtest

System Network Connections Discovery - Linux

Detects usage of system utilities to discover system network connections

LinuxProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectioninformationaltest

System Network Discovery - Linux

Detects enumeration of local network configuration

LinuxProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Ömer Günal and remotephone+1Tue Oct 06linux
Detectionmediumtest

Touch Suspicious Service File

Detects usage of the "touch" process in service file.

LinuxProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Joseliyo SanchezWed Jan 11linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Install Commands

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

LinuxProcess Creation
TA0005 · Defense EvasionT1014 · Rootkit
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionmediumtest

User Has Been Deleted Via Userdel

Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionmediumtest

User Added To Root/Sudoers Group Using Usermod

Detects usage of the "usermod" binary to add users add users to the root or suoders groups

LinuxProcess Creation
TA0004 · Privilege EscalationTA0003 · Persistence
TuanLe (GTSC)Wed Dec 21linux
Detectionhightest

Vim GTFOBin Abuse - Linux

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Linux Webshell Indicators

Detects suspicious sub processes of web server processes

LinuxProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Fri Oct 15linux
Detectionmediumtest

Download File To Potentially Suspicious Directory Via Wget

Detects the use of wget to download content to a suspicious directory

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Potential Xterm Reverse Shell

Detects usage of "xterm" as a potential reverse shell tunnel

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_Mon Apr 24linux
Emerging Threathightest

Sudo Privilege Escalation CVE-2019-14287

Detects users trying to exploit sudo vulnerability reported in CVE-2019-14287

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege EscalationT1548.003 · Sudo and Sudo Caching+2
Florian Roth (Nextron Systems)Tue Oct 152019
Emerging Threathightest

Atlassian Confluence CVE-2022-26134

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationT1059 · Command and Scripting Interpreter+2
Nasreddine Bencherchali (Nextron Systems)Fri Jun 032022
Emerging Threathightest

Apache Spark Shell Command Injection - ProcessCreation

Detects attempts to exploit an apache spark server via CVE-2014-6287 from a commandline perspective

LinuxProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2022-33891detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Jul 202022
Emerging Threathightest

CVE-2023-22518 Exploitation Attempt - Suspicious Confluence Child Process (Linux)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threathightest

UNC4841 - SSL Certificate Exfiltration Via Openssl

Detects the execution of "openssl" to connect to an IP address. This techniques was used by UNC4841 to exfiltrate SSL certificates and as a C2 channel with named pipes. Investigate commands executed in the temporal vicinity of this command.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Compressed Files From Temp.sh Using Wget

Detects execution of "wget" to download a ".zip" or ".rar" files from "temp.sh". As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

UNC4841 - Download Tar File From Untrusted Direct IP Via Wget

Detects execution of "wget" to download a "tar" from an IP address that doesn't have a trusted certificate. As seen used by UNC4841 during their Barracuda ESG zero day exploitation.

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Informationdetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threatcriticaltest

UNC4841 - Potential SEASPY Execution

Detects execution of specific named binaries which were used by UNC4841 to deploy their SEASPY backdoor

LinuxProcess Creation
TA0002 · Executiondetection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Fri Jun 162023
Emerging Threathightest

Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process

Detects potentially suspicious child process of SSH process (sshd) with a specific execution user. This could be a sign of potential exploitation of CVE-2024-3094.

LinuxProcess Creation
TA0002 · Executioncve.2024-3094detection.emerging-threats
Arnim Rupp+2Mon Apr 012024
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver - Linux

Detects suspicious child processes spawned by SAP NetWeaver on Linux systems that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

LinuxProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threathighexperimental

Linux Suspicious Child Process from Node.js - React2Shell

Detects suspicious child processes spawned from Node.js server processes on Linux systems, potentially indicating remote code execution exploitation such as CVE-2025-55182 (React2Shell). This rule particularly looks for exploitation of vulnerability on Node.js Servers where attackers abuse Node.js child_process module to execute arbitrary system commands. When execSync() or exec() is used, the command line often includes a shell invocation followed by suspicious commands or scripts (e.g., /bin/sh -c <malicious-command>). For other methods, the Image field will show the spawned process directly.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Swachchhanda Shrawan Poudel (Nextron Systems)+1Fri Dec 052025
Emerging Threathighexperimental

Shai-Hulud Malware Indicators - Linux

Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution - Linux

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

LinuxProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation - Linux

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Shai-Hulud NPM Package Malicious Exfiltration via Curl

Detects potential Shai Hulud NPM package attack attempting to exfiltrate data via curl to external webhook sites.

LinuxProcess Creation
TA0010 · ExfiltrationT1041 · Exfiltration Over C2 ChannelTA0009 · CollectionT1005 · Data from Local System+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 242025
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Linux

Detects the Linux-specific execution chain of the plain-crypto-js malicious npm dependency by Axios NPM package, including payload download via curl and detached execution using nohup and python3. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

LiteLLM / TeamPCP Supply Chain Attack Indicators

Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8). In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0009 · CollectionT1560.001 · Archive via Utility+4
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026
Threat Huntmediumtest

Terminate Linux Process Via Kill

Detects usage of command line tools such as "kill", "pkill" or "killall" to terminate or signal a running process.

LinuxProcess Creation
TA0005 · Defense EvasionT1562 · Impair Defensesdetection.threat-hunting
Tuan Le (NCSGroup)Thu Mar 16linux
Threat Huntlowstable

Process Discovery

Detects process discovery commands. Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

LinuxProcess Creation
TA0007 · DiscoveryT1057 · Process Discoverydetection.threat-hunting
Ömer Günal+2Tue Oct 06linux