Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Bitbucket Global Permission Changed

Detects global permissions change activity.

bitbucketaudit
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global Secret Scanning Rule Deleted

Detects Bitbucket global secret scanning rule deletion activity.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global SSH Settings Changed

Detects Bitbucket global SSH access configuration changes.

bitbucketaudit
TA0008 · Lateral MovementTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1021.004 · SSH
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Audit Log Configuration Updated

Detects changes to the bitbucket audit log configuration.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Details Export Attempt Detected

Detects user data export activity.

bitbucketaudit
TA0009 · CollectionTA0043 · ReconnaissanceTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure

Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+3
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure Via SSH

Detects SSH user login access failures. Please note that this rule can be noisy and is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0008 · Lateral MovementTA0006 · Credential AccessT1021.004 · SSHT1110 · Brute Force
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Permissions Export Attempt

Detects user permission data export attempt.

bitbucketaudit
TA0043 · ReconnaissanceTA0009 · CollectionTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumstable

Django Framework Exceptions

Detects suspicious Django web application framework exceptions that could indicate exploitation attempts

djangoapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSat Aug 05application
Detectionmediumtest

Github Delete Action Invoked

Detects delete action in the Github audit logs for codespaces, environment, project and repo.

githubaudit
TA0040 · ImpactTA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalThu Jan 19application
Detectionmediumtest

Github Fork Private Repositories Setting Enabled/Cleared

Detects when the policy allowing forks of private and internal repositories is changed (enabled or cleared).

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectionmediumtest

Github Outside Collaborator Detected

Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.

githubaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0009 · CollectionT1098.001 · Additional Cloud Credentials+2
Muhammad FaisalFri Jan 20application
Detectionmediumtest

Github Repository/Organization Transferred

Detects when a repository or an organization is being transferred to another location.

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectionmediumtest

Github SSH Certificate Configuration Changed

Detects when changes are made to the SSH certificate configuration of the organization.

githubaudit
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Romain GaillardMon Jul 29application
Detectionmediumtest

Kubernetes Admission Controller Modification

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

Kubernetesaudit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Kubernetesaudit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes Events Deleted

Detects when events are deleted in Kubernetes. An adversary may delete Kubernetes events in an attempt to evade detection.

Kubernetesapplicationaudit
TA0005 · Defense EvasionT1070 · Indicator Removal
Leo TsaousisTue Mar 26application
Detectionmediumtest

Potential Remote Command Execution In Pod Container

Detects attempts to execute remote commands, within a Pod's container using e.g. the "kubectl exec" command.

Kubernetesapplicationaudit
T1609 · Container Administration CommandTA0002 · Execution
Leo TsaousisTue Mar 26application
Detectionmediumtest

Creation Of Pod In System Namespace

Detects deployments of pods within the kube-system namespace, which could be intended to imitate system pods. System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names. Attackers can use this fact and name their backdoor pods as if they were created by these controllers to avoid detection. Deployment of such a backdoor container e.g. named kube-proxy-bv61v, could be attempted in the kube-system namespace alongside the other administrative containers.

Kubernetesapplicationaudit
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Leo TsaousisTue Mar 26application
Detectionmediumtest

Kubernetes Rolebinding Modification

Detects when a Kubernetes Rolebinding is created or modified.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes Secrets Modified or Deleted

Detects when Kubernetes Secrets are Modified or Deleted.

Kubernetesaudit
TA0006 · Credential Access
kelnageThu Jul 11application
Detectionmediumtest

Potential Sidecar Injection Into Running Deployment

Detects attempts to inject a sidecar container into a running deployment. A sidecar container is an additional container within a pod, that resides alongside the main container. One way to add containers to running resources like Deployments/DeamonSets/StatefulSets, is via a "kubectl patch" operation. By injecting a new container within a legitimate pod, an attacker can run their code and hide their activity, instead of running their own separated pod in the cluster.

Kubernetesapplicationaudit
T1609 · Container Administration CommandTA0002 · Execution
Leo TsaousisTue Mar 26application
Detectionmediumstable

Python SQL Exceptions

Generic rule for SQL exceptions in Python according to PEP 249

pythonapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSat Aug 12application
Detectionmediumstable

Ruby on Rails Framework Exceptions

Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts

ruby_on_railsapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSun Aug 06application
Detectionmediumstable

Spring Framework Exceptions

Detects suspicious Spring framework exceptions that could indicate exploitation attempts

springapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSun Aug 06application
Detectionmediumtest

Suspicious SQL Query

Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields

database
TA0010 · ExfiltrationTA0001 · Initial AccessTA0004 · Privilege EscalationTA0003 · Persistence+2
@juju4Tue Dec 27category
Detectionmediumexperimental

AWS Bucket Deleted

Detects the deletion of S3 buckets in AWS CloudTrail logs. Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.

AWScloudtrail
TA0005 · Defense Evasion
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumexperimental

AWS ConsoleLogin Failed Authentication

Detects failed AWS console login attempts due to authentication failures. Monitoring these events is crucial for identifying potential brute-force attacks or unauthorized access attempts to AWS accounts.

AWScloudtrail
TA0006 · Credential AccessT1110 · Brute Force
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumexperimental

AWS Successful Console Login Without MFA

Detects successful AWS console logins that were performed without Multi-Factor Authentication (MFA). This alert can be used to identify potential unauthorized access attempts, as logging in without MFA can indicate compromised credentials or misconfigured security settings.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Thuya+1Sat Oct 18cloud
Detectionmediumtest

AWS CloudTrail Important Change

Detects disabling, deleting and updating of a Trail

AWScloudtrail
TA0005 · Defense EvasionT1562.008 · Disable or Modify Cloud Logs
vitaliy0x1Tue Jan 21cloud
Detectionmediumtest

New Network Route Added

Detects the addition of a new network route to a route table in AWS.

AWScloudtrail
TA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
jamesc-grafanaThu Jul 11cloud
Detectionmediumexperimental

PUA - AWS TruffleHog Execution

Detects the execution of TruffleHog, a popular open-source tool used for scanning repositories for secrets and sensitive information, within an AWS environment. It has been reported to be used by threat actors for credential harvesting. All detections should be investigated to determine if the usage is authorized by security teams or potentially malicious.

AWScloudtrail
TA0006 · Credential AccessT1555 · Credentials from Password StoresT1003 · OS Credential Dumping
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Oct 21cloud
Detectionmediumexperimental

AWS EnableRegion Command Monitoring

Detects the use of the EnableRegion command in AWS CloudTrail logs. While AWS has 30+ regions, some of them are enabled by default, others must be explicitly enabled in each account separately. There may be situations where security monitoring does not cover some new AWS regions. Monitoring the EnableRegion command is important for identifying potential persistence mechanisms employed by adversaries, as enabling additional regions can facilitate continued access and operations within an AWS environment.

AWScloudtrail
TA0003 · Persistence
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumtest

Ingress/Egress Security Group Modification

Detects when an account makes changes to the ingress or egress rules of a security group. This can indicate that an attacker is attempting to open up new attack vectors in the account, that they are trying to exfiltrate data over the network, or that they are trying to allow machines in that VPC/Subnet to contact a C&C server.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

LoadBalancer Security Group Modification

Detects changes to the security groups associated with an Elastic Load Balancer (ELB) or Application Load Balancer (ALB). This can indicate that a misconfiguration allowing more traffic into the system than required, or could indicate that an attacker is attempting to enable new connections into a VPC or subnet controlled by the account.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

RDS Database Security Group Modification

Detects changes to the security group entries for RDS databases. This can indicate that a misconfiguration has occurred which potentially exposes the database to the public internet, a wider audience within the VPC or that removal of valid rules has occurred which could impact the availability of the database to legitimate services and users.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumtest

AWS Console GetSigninToken Potential Abuse

Detects potentially suspicious events involving "GetSigninToken". An adversary using the "aws_consoler" tool can leverage this console API to create temporary federated credential that help obfuscate which AWS credential is compromised (the original access key) and enables the adversary to pivot from the AWS CLI to console sessions without the need for MFA using the new access key issued in this request.

AWScloudtrail
TA0008 · Lateral MovementTA0005 · Defense EvasionT1021.007 · Cloud ServicesT1550.001 · Application Access Token
Chester Le BronMon Feb 26cloud
Detectionmediumtest

SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

AWScloudtrail
TA0005 · Defense EvasionT1070 · Indicator Removal
Janantha MarasingheTue Dec 13cloud
Detectionmediumexperimental

AWS SAML Provider Deletion Activity

Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access. An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.

AWScloudtrail
T1078.004 · Cloud AccountsTA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial Access+3
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS S3 Bucket Versioning Disable

Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.

AWScloudtrail
TA0040 · ImpactT1490 · Inhibit System Recovery
Sean Johnstone | Unit 42Sat Oct 28cloud
Detectionmediumstable

AWS EC2 Disable EBS Encryption

Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region. Disabling default encryption does not change the encryption status of your existing volumes.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactT1565 · Data Manipulation
Sittikorn STue Jun 29cloud
Detectionmediumexperimental

AWS Key Pair Import Activity

Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS ECS Task Definition That Queries The Credential Endpoint

Detects when an Elastic Container Service (ECS) Task Definition includes a command to query the credential endpoint. This can indicate a potential adversary adding a backdoor to establish persistence or escalate privileges.

AWScloudtrail
TA0003 · PersistenceT1525 · Implant Internal Image
Darin SmithTue Jun 07cloud
Detectionmediumtest

AWS EFS Fileshare Modified or Deleted

Detects when a EFS Fileshare is modified or deleted. You can't delete a file system that is in use. If the file system has any mount targets, the adversary must first delete them, so deletion of a mount will occur before deletion of a fileshare.

AWScloudtrail
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

AWS EFS Fileshare Mount Modified or Deleted

Detects when a EFS Fileshare Mount is modified or deleted. An adversary breaking any file system using the mount target that is being deleted, which might disrupt instances or applications using those mounts.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerSun Aug 15cloud
Detectionmediumtest

AWS IAM Backdoor Users Keys

Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
falokerWed Feb 12cloud
Detectionmediumexperimental

New AWS Lambda Function URL Configuration Created

Detects when a user creates a Lambda function URL configuration, which could be used to expose the function to the internet and potentially allow unauthorized access to the function's IAM role for AWS API calls. This could give an adversary access to the privileges associated with the Lambda service role that is attached to that function.

AWScloudtrail
TA0001 · Initial AccessTA0004 · Privilege Escalation
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS RDS Master Password Change

Detects the change of database master password. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud