Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Log Entries

Detects suspicious log entries in Linux log files

Linux
TA0040 · Impact
Florian Roth (Nextron Systems)Sat Mar 25linux
Detectionmediumtest

Suspicious Use of /dev/tcp

Detects suspicious command with /dev/tcp

Linux
TA0043 · Reconnaissance
François HubautFri Dec 10linux
Detectionmediumtest

Suspicious OpenSSH Daemon Error

Detects suspicious SSH / SSHD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxsshd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Fri Jun 30linux
Detectionmediumtest

Disabling Security Tools - Builtin

Detects disabling security tools

Linuxsyslog
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionmediumtest

Suspicious VSFTPD Error Messages

Detects suspicious VSFTPD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxvsftpd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Wed Jul 05linux
Detectionmediumstable

Linux Doas Conf File Creation

Detects the creation of doas.conf file in linux host platform.

LinuxFile Event
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Sittikorn S+1Thu Jan 20linux
Detectionmediumtest

Persistence Via Cron Files

Detects creation of cron file or files in Cron directories which could indicates potential persistence.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

Persistence Via Sudoers Files

Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionmediumtest

Wget Creating Files in Tmp Directory

Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"

LinuxFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Shell Invocation via Apt - Linux

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Linux Base64 Encoded Pipe to Shell

Detects suspicious process command line that uses base64 encoded input for execution with a shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Martin MuellerTue Jul 26linux
Detectionmediumtest

Linux Base64 Encoded Shebang In CLI

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Andreas HunkelerFri Feb 11linux
Detectionmediumtest

Enable BPF Kprobes Tracing

Detects common command used to enable bpf kprobes tracing

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 25linux
Detectionmediumtest

Remove Immutable File Attribute

Detects usage of the 'chattr' utility to remove immutable file attribute.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumstable

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Ömer Günal+1Wed Oct 07linux
Detectionmediumtest

Remove Scheduled Cron Task/Job

Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Potential Linux Process Code Injection Via DD Utility

Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.009 · Proc Memory
Joseph KamauFri Dec 01linux
Detectionmediumtest

Ufw Force Stop Using Ufw-Init

Detects attempts to force stop the ufw using ufw-init

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Joseliyo SanchezWed Jan 18linux
Detectionmediumtest

ESXi Network Configuration Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi Syslog Configuration Change Via ESXCLI

Detects changes to the ESXi syslog configuration via "esxcli"

LinuxProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1562.001 · Disable or Modify ToolsT1562.003 · Impair Command History Logging+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi System Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi Account Creation Via ESXCLI

Detects user account creation on ESXi system via esxcli

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1136 · Create Accountattack.t1059.012
Cedric MaurugeonTue Aug 22linux
Detectionmediumtest

ESXi VM List Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi VM Kill Via ESXCLI

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

LinuxProcess Creation
TA0002 · ExecutionTA0040 · Impactattack.t1059.012T1529 · System Shutdown/Reboot
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

Group Has Been Deleted Via Groupdel

Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionmediumtest

Suspicious Package Installed - Linux

Detects installation of suspicious packages using system installation utilities

LinuxProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionmediumtest

Flush Iptables Ufw Chain

Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Joseliyo SanchezWed Jan 18linux
Detectionmediumtest

Potentially Suspicious Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionmediumtest

Mount Execution With Hidepid Parameter

Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system

LinuxProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionT1564 · Hide Artifacts
Joseliyo SanchezThu Jan 12linux
Detectionmediumtest

Nohup Execution

Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Christopher Peacock+1Mon Jun 06linux
Detectionmediumtest

Pnscan Binary Data Transmission Activity

Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network. This behavior has been identified in a Linux malware campaign targeting Docker, Apache Hadoop, Redis, and Confluence and was previously used by the threat actor known as TeamTNT

LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
David BurkettTue Apr 16linux
Detectionmediumexperimental

PUA - TruffleHog Execution - Linux

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

LinuxProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24linux
Detectionmediumexperimental

Python WebServer Execution - Linux

Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a web server without requiring additional software. This technique is commonly used in post-exploitation scenarios as it provides a simple method for transferring files between the compromised host and attacker-controlled systems.

LinuxProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Mohamed LAKRIFri Oct 17linux
Detectionmediumtest

Python Spawning Pretty TTY Via PTY Module

Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nextron SystemsFri Jun 03linux
Detectionmediumtest

Potential Ruby Reverse Shell

Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumtest

Scheduled Cron Task/Job - Linux

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

LinuxProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06linux
Detectionmediumtest

Disabling Security Tools

Detects disabling security tools

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionmediumtest

Disable Or Stop Services

Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Potential Linux Amazon SSM Agent Hijacking

Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.

LinuxProcess Creation
TA0011 · Command and ControlTA0003 · Persistenceattack.t1219.002
Muhammad FaisalThu Aug 03linux
Detectionmediumtest

Chmod Suspicious Directory

Detects chmod targeting files in abnormal directory paths.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Christopher Peacock+1Fri Jun 03linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionmediumtest

Suspicious Curl Change User Agents - Linux

Detects a suspicious curl process start on linux with set useragent options

LinuxProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Potentially Suspicious Execution From Tmp Folder

Detects a potentially suspicious execution of a process located in the '/tmp/' folder

LinuxProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Potential Discovery Activity Using Find - Linux

Detects usage of "find" binary in a suspicious manner to perform discovery

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Suspicious Git Clone - Linux

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

LinuxProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux