Rule Library

Sigma Rules

1,473 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Print History File Contents

Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionmediumtest

Interactive Bash Suspicious Children

Detects suspicious interactive bash as a parent to rather uncommon child processes

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.004 · Unix ShellT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionmediumtest

Linux Shell Pipe to Shell

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionmediumtest

Access of Sudoers File Content

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionmediumtest

Potential Suspicious Change To Sensitive/Critical Files

Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Tue May 30linux
Detectionmediumtest

Execution Of Script Located In Potentially Suspicious Directory

Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Touch Suspicious Service File

Detects usage of the "touch" process in service file.

LinuxProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Joseliyo SanchezWed Jan 11linux
Detectionmediumtest

User Has Been Deleted Via Userdel

Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionmediumtest

User Added To Root/Sudoers Group Using Usermod

Detects usage of the "usermod" binary to add users add users to the root or suoders groups

LinuxProcess Creation
TA0004 · Privilege EscalationTA0003 · Persistence
TuanLe (GTSC)Wed Dec 21linux
Detectionmediumtest

Download File To Potentially Suspicious Directory Via Wget

Detects the use of wget to download content to a suspicious directory

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Potential Xterm Reverse Shell

Detects usage of "xterm" as a potential reverse shell tunnel

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_Mon Apr 24linux
Detectionmediumtest

MacOS Emond Launch Daemon

Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege Escalationattack.t1546.014
Alejandro Ortuno+1Fri Oct 23macos
Detectionmediumtest

MacOS Scripting Interpreter AppleScript

Detects execution of AppleScript of the macOS scripting language AppleScript.

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Alejandro Ortuno+1Wed Oct 21macos
Detectionmediumtest

File Time Attribute Change

Detect file time attribute change to hide new or changes to existing files

macOSProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionmediumtest

Indicator Removal on Host - Clear Mac System Logs

Detects deletion of local audit logs

macOSProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
remotephone+1Sun Oct 11macos
Detectionmediumtest

Hidden User Creation

Detects creation of a hidden user account on macOS (UserID < 500) or with IsHidden option

macOSProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
Daniil Yugoslavskiy+1Sat Oct 10macos
Detectionmediumtest

Credentials from Password Stores - Keychain

Detects passwords dumps from Keychain

macOSProcess Creation
TA0006 · Credential AccessT1555.001 · Keychain
Tim Ismilyaev+2Mon Oct 19macos
Detectionmediumtest

System Integrity Protection (SIP) Disabled

Detects the use of csrutil to disable the Configure System Integrity Protection (SIP). This technique is used in post-exploit scenarios.

macOSProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Joseliyo SanchezTue Jan 02macos
Detectionmediumtest

Disable Security Tools

Detects disabling security tools

macOSProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

User Added To Admin Group Via Dscl

Detects attempts to create and add an account to the admin group via "dscl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionmediumtest

User Added To Admin Group Via DseditGroup

Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Root Account Enable Via Dsenableroot

Detects attempts to enable the root account via "dsenableroot"

macOSProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1078 · Valid AccountsT1078.001 · Default Accounts+3
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Disk Image Creation Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to create a disk image.

macOSProcess Creation
TA0010 · Exfiltration
Omar KhaledSat Aug 10macos
Detectionmediumtest

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

macOSProcess Creation
TA0001 · Initial AccessTA0009 · CollectionT1566.001 · Spearphishing AttachmentT1560.001 · Archive via Utility
Omar KhaledSat Aug 10macos
Detectionmediumtest

Suspicious Installer Package Child Process

Detects the execution of suspicious child processes from macOS installer package parent process. This includes osascript, JXA, curl and wget amongst other interpreters

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1059.007 · JavaScriptT1071 · Application Layer ProtocolT1071.001 · Web Protocols+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumtest

System Information Discovery Using Ioreg

Detects the use of "ioreg" which will show I/O Kit registry information. This process is used for system information discovery. It has been observed in-the-wild by calling this process directly or using bash and grep to look for specific strings.

macOSProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

JAMF MDM Potential Suspicious Child Process

Detects potential suspicious child processes of "jamf". Could be a sign of potential abuse of Jamf as a C2 server as seen by Typhon MythicAgent.

macOSProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 22macos
Detectionmediumtest

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

macOSProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1569.001 · Launchctl+2
Pratinav ChandraMon May 13macos
Detectionmediumtest

File Download Via Nscurl - MacOS

Detects the execution of the nscurl utility in order to download files.

macOSProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Daniel CortezTue Jun 04macos
Detectionmediumtest

Payload Decoded and Decrypted via Built-in Utilities

Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1204 · User ExecutionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+3
Tim Rauch+1Mon Oct 17macos
Detectionmediumexperimental

Remote Access Tool - Potential MeshAgent Execution - MacOS

Detects potential execution of MeshAgent which is a tool used for remote access. Historical data shows that threat actors rename MeshAgent binary to evade detection. Matching command lines with the '--meshServiceName' argument can indicate that the MeshAgent is being used for remote access.

macOSProcess Creation
TA0011 · Command and Controlattack.t1219.002
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionmediumtest

Scheduled Cron Task/Job - MacOs

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06macos
Detectionmediumtest

Security Software Discovery - MacOs

Detects usage of system utilities (only grep for now) to discover security software discovery

macOSProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

Suspicious Browser Child Process - MacOS

Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.

macOSProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1189 · Drive-by CompromiseT1203 · Exploitation for Client Execution+1
Sohan G (D4rkCiph3r)Wed Apr 05macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionmediumtest

Suspicious History File Operations

Detects commandline operations on shell history files

macOSProcess Creation
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectionmediumtest

Suspicious MacOS Firmware Activity

Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.

macOSProcess Creation
TA0040 · Impact
Austin SongerThu Sep 30macos
Detectionmediumtest

Osacompile Execution By Potentially Suspicious Applet/Osascript

Detects potential suspicious applet or osascript executing "osacompile".

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Sohan G (D4rkCiph3r)+1Mon Apr 03macos
Detectionmediumtest

System Information Discovery Using sw_vers

Detects the use of "sw_vers" for system information discovery

macOSProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectionmediumtest

System Information Discovery Using System_Profiler

Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information. This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.

macOSProcess Creation
TA0007 · DiscoveryTA0005 · Defense EvasionT1082 · System Information DiscoveryT1497.001 · System Checks
Stephen Lincoln (AttackIQ)Tue Jan 02macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos