Rule Library

Sigma Rules

241 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Binary Padding - Linux

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

Linuxauditd
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+1Tue Oct 13linux
Detectionmediumtest

Bpfdoor TCP Ports Redirect

All TCP traffic on particular port from attacker is routed to different port. ex. '/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392' The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.

Linuxauditd
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Rafal PiaseckiWed Aug 10linux
Detectionlowtest

Linux Capabilities Discovery

Detects attempts to discover the files with setuid/setgid capability on them. That would allow adversary to escalate their privileges.

Linuxauditd
TA0007 · DiscoveryTA0005 · Defense EvasionTA0004 · Privilege EscalationT1083 · File and Directory Discovery+1
Pawel MazurSun Nov 28linux
Detectionmediumtest

File Time Attribute Change - Linux

Detect file time attribute change to hide new or changes to existing files.

Linuxauditd
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Remove Immutable File Attribute - Auditd

Detects removing immutable file attribute.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionlowtest

Clipboard Collection with Xclip Tool - Auditd

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Sep 24linux
Detectionlowtest

Clipboard Collection of Image Data with Xclip Tool

Detects attempts to collect image data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Oct 01linux
Detectioncriticaltest

Possible Coin Miner CPU Priority Param

Detects command line parameter very often used with coin miners

Linuxauditd
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Florian Roth (Nextron Systems)Sat Oct 09linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionmediumtest

Data Exfiltration with Wget

Detects attempts to post the file with the usage of wget utility. The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.

Linuxauditd
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Pawel MazurThu Nov 18linux
Detectionlowstable

Overwriting the File with Dev Zero or Null

Detects overwriting (effectively wiping/deleting) of a file.

Linuxauditd
TA0040 · ImpactT1485 · Data Destruction
Jakob Weinzettl+1Wed Oct 23linux
Detectionlowtest

File or Folder Permissions Change

Detects file and folder permission changes.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionhightest

Credentials In Files - Linux

Detecting attempts to extract passwords with grep

Linuxauditd
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+1Thu Oct 15linux
Detectionlowtest

Hidden Files and Directories

Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character

Linuxauditd
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
Pawel MazurMon Sep 06linux
Detectionlowtest

Steganography Hide Zip Information in Picture File

Detects appending of zip file to image

Linuxauditd
TA0005 · Defense EvasionT1027.003 · Steganography
Pawel MazurThu Sep 09linux
Detectionmediumtest

Masquerading as Linux Crond Process

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Linuxauditd
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Timur Zinniatullin+1Mon Oct 21linux
Detectionmediumtest

Modify System Firewall

Detects the removal of system firewall rules. Adversaries may only delete or modify a specific system firewall rule to bypass controls limiting network usage or access. Detection rules that match only on the disabling of firewalls will miss this.

Linuxauditd
T1562.004 · Disable or Modify System FirewallTA0005 · Defense Evasion
IAIMon Mar 06linux
Detectionlowtest

Network Sniffing - Linux

Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

Linuxauditd
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Screen Capture with Import Tool

Detects adversary creating screen capture of a desktop with Import Tool. Highly recommended using rule on servers, due to high usage of screenshot utilities on user workstations. ImageMagick must be installed.

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurTue Sep 21linux
Detectionlowtest

Screen Capture with Xwd

Detects adversary creating screen capture of a full with xwd. Highly recommended using rule on servers, due high usage of screenshot utilities on user workstations

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurMon Sep 13linux
Detectionlowtest

Steganography Hide Files with Steghide

Detects embedding of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.

Linuxauditd
TA0005 · Defense EvasionT1027.003 · Steganography
Pawel MazurSat Sep 11linux
Detectionlowtest

Steganography Extract Files with Steghide

Detects extraction of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.

Linuxauditd
TA0005 · Defense EvasionT1027.003 · Steganography
Pawel MazurSat Sep 11linux
Detectionmediumtest

Suspicious Commands Linux

Detects relevant commands often related to malware or hacking activity

Linuxauditd
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Tue Dec 12linux
Detectionmediumtest

Suspicious History File Operations - Linux

Detects commandline operations on shell history files

Linuxauditd
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17linux
Detectionlowtest

Service Reload or Start - Linux

Detects the start, reload or restart of a service.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Jakob Weinzettl+2Mon Sep 23linux
Detectioninformationaltest

System Shutdown/Reboot - Linux

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

Linuxauditd
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+1Thu Oct 15linux
Detectionlowtest

Steganography Unzip Hidden Information From Picture File

Detects extracting of zip file from image file

Linuxauditd
TA0005 · Defense EvasionT1027.003 · Steganography
Pawel MazurThu Sep 09linux
Detectionlowtest

System Owner or User Discovery - Linux

Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc. Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Linuxauditd
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Audio Capture

Detects attempts to record audio using the arecord and ecasound utilities.

Linuxauditd
TA0009 · CollectionT1123 · Audio Capture
Pawel Mazur+1Sat Sep 04linux
Detectionhighexperimental

ASLR Disabled Via Sysctl or Direct Syscall - Linux

Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including: - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000) - Modification of the /proc/sys/kernel/randomize_va_space file - Execution of the `sysctl` command to set `kernel.randomize_va_space=0` Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms. A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

Linuxauditd
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1055.009 · Proc Memory
Milad CheraghiMon May 26linux
Detectionhightest

Linux Keylogging with Pam.d

Detect attempt to enable auditing of TTY input

Linuxauditd
TA0009 · CollectionTA0006 · Credential AccessT1003 · OS Credential DumpingT1056.001 · Keylogging
Pawel MazurMon May 24linux
Detectionlowstable

Password Policy Discovery - Linux

Detects password policy discovery commands

Linuxauditd
TA0007 · DiscoveryT1201 · Password Policy Discovery
Ömer Günal+2Thu Oct 08linux
Detectionmediumtest

Suspicious C2 Activities

Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'. This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap. These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)

Linuxauditd
TA0011 · Command and Control
Marie EulerMon May 18linux
Detectionlowtest

System Information Discovery - Auditd

Detects System Information Discovery commands

Linuxauditd
TA0007 · DiscoveryT1082 · System Information Discovery
Pawel MazurFri Sep 03linux
Detectionhightest

Auditing Configuration Changes on Linux Host

Detect changes in auditd configuration files

Linuxauditd
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
Mikhail Larin+1Fri Oct 25linux
Detectionhightest

BPFDoor Abnormal Process ID or Lock File Accessed

detects BPFDoor .lock and .pid files access in temporary file storage facility

Linuxauditd
TA0002 · ExecutionT1106 · Native APIT1059 · Command and Scripting Interpreter
Rafal PiaseckiWed Aug 10linux
Detectionlowtest

Use Of Hidden Paths Or Files

Detects calls to hidden files or files located in hidden directories in NIX systems.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
David BurkettFri Dec 30linux
Detectionhightest

Modification of ld.so.preload

Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.006 · Dynamic Linker Hijacking
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24linux
Detectionhightest

Logging Configuration Changes on Linux Host

Detect changes of syslog daemons configuration files

Linuxauditd
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
Mikhail Larin+1Fri Oct 25linux
Detectionmediumexperimental

Potential Abuse of Linux Magic System Request Key

Detects the potential abuse of the Linux Magic SysRq (System Request) key by adversaries with root or sufficient privileges to silently manipulate or destabilize a system. By writing to /proc/sysrq-trigger, they can crash the system, kill processes, or disrupt forensic analysis—all while bypassing standard logging. Though intended for recovery and debugging, SysRq can be misused as a stealthy post-exploitation tool. It is controlled via /proc/sys/kernel/sysrq or permanently through /etc/sysctl.conf.

Linuxauditd
TA0002 · ExecutionT1059.004 · Unix ShellTA0040 · ImpactT1529 · System Shutdown/Reboot+2
Milad CheraghiFri May 23linux
Detectionmediumtest

Systemd Service Creation

Detects a creation of systemd services which could be used by adversaries to execute malicious code.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Pawel MazurThu Feb 03linux
Detectioninformationalstable

System and Hardware Information Discovery

Detects system information discovery commands

Linuxauditd
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionmediumtest

Unix Shell Configuration Modification

Detect unix shell configuration modification. Adversaries may establish persistence through executing malicious commands triggered when a new shell is opened.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.004 · .bash_profile and .bashrc
Peter Matkovski+1Mon Mar 06linux
Detectionhightest

Disable System Firewall

Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.

Linuxauditd
T1562.004 · Disable or Modify System FirewallTA0005 · Defense Evasion
Pawel MazurSat Jan 22linux
Detectionmediumexperimental

Clear or Disable Kernel Ring Buffer Logs via Syslog Syscall

Detects the use of the `syslog` syscall with action code 5 (SYSLOG_ACTION_CLEAR), (4 is SYSLOG_ACTION_READ_CLEAR and 6 is SYSLOG_ACTION_CONSOLE_OFF) which clears the kernel ring buffer (dmesg logs). This can be used by attackers to hide traces after exploitation or privilege escalation. A common technique is running `dmesg -c`, which triggers this syscall internally.

Linuxauditd
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Milad CheraghiTue May 27linux
Detectionmediumtest

Creation Of An User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

Linuxauditd
T1136.001 · Local AccountTA0003 · Persistence
Marie Euler+1Mon May 18linux
Detectionhightest

Loading of Kernel Module via Insmod

Detects loading of kernel modules with insmod command. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Adversaries may use LKMs to obtain persistence within the system or elevate the privileges.

Linuxauditd
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.006 · Kernel Modules and Extensions
Pawel MazurTue Nov 02linux
Detectionlowtest

Linux Network Service Scanning - Auditd

Detects enumeration of local or remote network services.

Linuxauditd
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+1Wed Oct 21linux