Rule Library

Sigma Rules

334 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Bitbucket Project Secret Scanning Allowlist Added

Detects when a secret scanning allowlist rule is added for projects.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Secret Scanning Rule Deleted

Detects when secret scanning rule is deleted for the project or repository.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Github New Secret Created

Detects when a user creates action secret for the organization, environment, codespaces or repository.

githubaudit
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationTA0001 · Initial Access+1
Muhammad FaisalFri Jan 20application
Detectionlowexperimental

GitHub Repository Pages Site Changed to Public

Detects when a GitHub Pages site of a repository is made public. This usually is part of a publishing process but could indicate or lead to potential unauthorized exposure of sensitive information or code.

githubaudit
TA0009 · CollectionTA0010 · ExfiltrationT1567.001 · Exfiltration to Code Repository
Ivan SaakovSat Oct 18application
Detectionlowtest

Github Push Protection Bypass Detected

Detects when a user bypasses the push protection on a secret detected by secret scanning.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionlowexperimental

GitHub Repository Archive Status Changed

Detects when a GitHub repository is archived or unarchived, which may indicate unauthorized changes to repository status.

githubaudit
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · Impact
Ivan SaakovSat Oct 18application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionlowtest

Deployment Deleted From Kubernetes Cluster

Detects the removal of a deployment from a Kubernetes cluster. This could indicate disruptive activity aiming to impact business operations.

Kubernetesapplicationaudit
T1498 · Network Denial of ServiceTA0040 · Impact
Leo TsaousisTue Mar 26application
Detectionlowtest

Container With A hostPath Mount Created

Detects creation of a container with a hostPath mount. A hostPath volume mounts a directory or a file from the node to the container. Attackers who have permissions to create a new pod in the cluster may create one with a writable hostPath volume and chroot to escape to the underlying node.

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionlowtest

Privileged Container Deployed

Detects the creation of a "privileged" container, an action which could be indicative of a threat actor mounting a container breakout attacks. A privileged container is a container that can access the host with all of the root capabilities of the host machine. This allows it to view, interact and modify processes, network operations, IPC calls, the file system, mount points, SELinux configurations etc. as the root user on the host. Various versions of "privileged" containers can be specified, e.g. by setting the securityContext.privileged flag in the resource specification, setting non-standard Linux capabilities, or configuring the hostNetwork/hostPID fields

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionlowtest

RBAC Permission Enumeration Attempt

Detects identities attempting to enumerate their Kubernetes RBAC permissions. In the early stages of a breach, attackers will aim to list the permissions they have within the compromised environment. In a Kubernetes cluster, this can be achieved by interacting with the API server, and querying the SelfSubjectAccessReview API via e.g. a "kubectl auth can-i --list" command. This will enumerate the Role-Based Access Controls (RBAC) rules defining the compromised user's authorization.

Kubernetesapplicationaudit
T1069.003 · Cloud GroupsT1087.004 · Cloud AccountTA0007 · Discovery
Leo TsaousisTue Mar 26application
Detectionlowtest

Kubernetes Secrets Enumeration

Detects enumeration of Kubernetes secrets.

Kubernetesapplicationaudit
T1552.007 · Container APITA0006 · Credential Access
Leo TsaousisTue Mar 26application
Detectionlowtest

New Kubernetes Service Account Created

Detects creation of new Kubernetes service account, which could indicate an attacker's attempt to persist within a cluster.

Kubernetesapplicationaudit
TA0003 · PersistenceT1136 · Create Account
Leo TsaousisTue Mar 26application
Detectionlowtest

Kubernetes Unauthorized or Unauthenticated Access

Detects when a request to the Kubernetes API is rejected due to lack of authorization or due to an expired authentication token being used. This may indicate an attacker attempting to leverage credentials they have obtained.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageFri Apr 12application
Detectionlowtest

New Network ACL Entry Added

Detects that network ACL entries have been added to a route table which could indicate that new attack vectors have been opened up in the AWS account.

AWScloudtrail
TA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
jamesc-grafanaThu Jul 11cloud
Detectionlowtest

AWS EC2 VM Export Failure

An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.

AWScloudtrail
TA0009 · CollectionT1005 · Data from Local SystemTA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Diogo BrazThu Apr 16cloud
Detectionlowtest

AWS EKS Cluster Created or Deleted

Identifies when an EKS cluster is created or deleted.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerMon Aug 16cloud
Detectionlowtest

AWS ElastiCache Security Group Created

Detects when an ElastiCache security group has been created.

AWScloudtrail
TA0003 · PersistenceT1136 · Create AccountT1136.003 · Cloud Account
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS ElastiCache Security Group Modified or Deleted

Identifies when an ElastiCache security group has been modified or deleted.

AWScloudtrail
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Jul 24cloud
Detectionlowtest

Potential Bucket Enumeration on AWS

Looks for potential enumeration of AWS buckets via ListBuckets.

AWScloudtrail
TA0007 · DiscoveryT1580 · Cloud Infrastructure DiscoveryT1619 · Cloud Storage Object Discovery
Christopher Peacock+1Fri Jan 06cloud
Detectionlowtest

AWS New Lambda Layer Attached

Detects when a user attached a Lambda layer to an existing Lambda function. A malicious Lambda layer could execute arbitrary code in the context of the function's IAM role. This would give an adversary access to resources that the function has access to.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerThu Sep 23cloud
Detectionlowtest

AWS Glue Development Endpoint Activity

Detects possible suspicious glue development endpoint activity.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerSun Oct 03cloud
Detectionlowtest

AWS Route 53 Domain Transfer Lock Disabled

Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential AccessT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS Route 53 Domain Transferred to Another Account

Detects when a request has been made to transfer a Route 53 domain to another AWS account.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0004 · Privilege EscalationT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS S3 Data Management Tampering

Detects when a user tampers with S3 data management in Amazon Web Services.

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS STS AssumeRole Misuse

Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS STS GetSessionToken Misuse

Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionlowtest

Azure Container Registry Created or Deleted

Detects when a Container Registry is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionlowtest

Azure Kubernetes Cluster Created or Deleted

Detects when a Azure Kubernetes Cluster is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionlowtest

End User Consent

Detects when an end user consents to an application

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Thu Jul 28cloud
Detectionlowtest

Measurable Increase Of Successful Authentications

Detects when successful sign-ins increased by 10% or greater.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Mark Morowczynski+2Thu Aug 11cloud
Detectionlowtest

Failed Authentications From Countries You Do Not Operate Out Of

Detect failed authentications from countries you do not operate out of.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonThu Jul 28cloud
Detectionlowtest

Azure AD Only Single Factor Authentication Required

Detect when users are authenticating without MFA being required.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonWed Jul 27cloud
Detectionlowtest

Sign-ins by Unknown Devices

Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionlowtest

Google Cloud Storage Buckets Enumeration

Detects when storage bucket is enumerated in Google Cloud.

Google Cloudgcp.audit
TA0007 · Discovery
Austin SongerSat Aug 14cloud
Detectionlowtest

Suspicious Inbox Forwarding

Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.

Microsoft 365threat_management
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Austin SongerSun Aug 22cloud
Detectionlowtest

Okta Policy Modified or Deleted

Detects when an Okta policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionlowtest

OneLogin User Assumed Another User

Detects when an user assumed another user account.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowtest

OneLogin User Account Locked

Detects when an user account is locked or suspended.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowtest

Linux Capabilities Discovery

Detects attempts to discover the files with setuid/setgid capability on them. That would allow adversary to escalate their privileges.

Linuxauditd
TA0007 · DiscoveryTA0005 · Defense EvasionTA0004 · Privilege EscalationT1083 · File and Directory Discovery+1
Pawel MazurSun Nov 28linux
Detectionlowtest

Clipboard Collection with Xclip Tool - Auditd

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Sep 24linux
Detectionlowtest

Clipboard Collection of Image Data with Xclip Tool

Detects attempts to collect image data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Oct 01linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowstable

Overwriting the File with Dev Zero or Null

Detects overwriting (effectively wiping/deleting) of a file.

Linuxauditd
TA0040 · ImpactT1485 · Data Destruction
Jakob Weinzettl+1Wed Oct 23linux
Detectionlowtest

File or Folder Permissions Change

Detects file and folder permission changes.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionlowtest

Hidden Files and Directories

Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character

Linuxauditd
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
Pawel MazurMon Sep 06linux
Detectionlowtest

Steganography Hide Zip Information in Picture File

Detects appending of zip file to image

Linuxauditd
TA0005 · Defense EvasionT1027.003 · Steganography
Pawel MazurThu Sep 09linux
Detectionlowtest

Network Sniffing - Linux

Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

Linuxauditd
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+1Mon Oct 21linux