Exploit Layer


Suspicious Access to File Manager / phpMyAdmin

Sigma (Web Logs)

title: Suspicious File Manager Access  
logsource:  
  category: webserver  
detection:  
  selection:  
    uri_path|contains:  
      - "file-manager/backend/makefile"  
      - "phpmyadmin/js/"  
condition: selection  
level: high  

WAF Rule

title: Suspicious clp-fm Cookie  
logsource:  
  category: webserver  
detection:  
  selection:  
    http.cookie|contains: "clp-fm="  
condition: selection  
level: high  

Webshell Layer


Outbound Requests with ?cmd=

Suricata IDS

alert http any any -> any any (msg:"Webshell Command Execution"; http.uri; content:"cmd="; nocase; sid:100001; rev:1;)

POST Parameter mxx

Suricata IDS

alert http any any -> any any (msg:"Suspicious POST param mxx"; http.request_body; content:"mxx="; nocase; sid:100002; rev:1;)

Persistence Layer


New User Creation (zeroday)

Auditd

title: Suspicious User Creation  
logsource:  
  category: auditd  
detection:  
  selection:  
    syscall: useradd  
    exe: /usr/sbin/useradd  
    a0: "zeroday"  
condition: selection  
level: critical  

Webshell File Creation

EDR Rule

title: Webshell File Creation  
logsource:  
  category: file  
detection:  
  selection:  
    file.path|endswith: "/htdocs/app/files/public/shell.php"  
condition: selection  
level: high  

Exfiltration Layer


Rclone Process Execution

Sysmon

title: Rclone Execution  
logsource:  
  category: process_creation  
detection:  
  selection:  
    Image|endswith:  
      - "rclone"  
      - "rclone.exe"  
condition: selection  
level: high  

Dropbox API Traffic

Proxy Logs

title: Dropbox API Traffic  
logsource:  
  category: proxy  
detection:  
  selection:  
    dst_domain: "api.dropboxapi.com"  
condition: selection  
level: medium  

Unexpected S3 Bucket Activity

CloudTrail

title: Suspicious S3 Activity  
logsource:  
  category: aws.cloudtrail  
detection:  
  selection:  
    eventName:  
      - "PutObject"  
      - "DeleteObject"  
    userIdentity.type: "IAMUser"  
condition: selection  
level: high  

Infrastructure Automation Layer

Unusual WordPress Installs

Web Logs

title: Suspicious WordPress Install  
logsource:  
  category: webserver  
detection:  
  selection:  
    uri_path: "/wp-admin/install.php"  
    http.method: "POST"  
condition: selection  
level: medium  

Reverse Proxy Creation

Nginx Logs

title: Reverse Proxy Config Changes  
logsource:  
  category: webserver  
detection:  
  selection:  
    config_change: true  
    upstream|contains: "external"  
condition: selection  
level: high  

Summary

These rules provide coverage across:

  • Exploit attempts (file manager, phpMyAdmin, cookies)
  • Webshell activity (?cmd=, mxx param, file creation)
  • Persistence (new accounts, shell uploads)
  • Exfiltration (Rclone, Dropbox, AWS S3)
  • Infrastructure automation (WordPress installs, reverse proxy configs)

License

Detection rules are licensed under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Free to use in your environment, but not for commercial purposes.