Rule Library

Sigma Rules

3,116 rules found for "sigma"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioninformationaltest

System Shutdown/Reboot - MacOs

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

macOSProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+2Mon Oct 19macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionlowtest

Gatekeeper Bypass via Xattr

Detects macOS Gatekeeper bypass via xattr utility

macOSProcess Creation
TA0005 · Defense EvasionT1553.001 · Gatekeeper Bypass
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

Potential XCSSET Malware Infection

Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionhightest

Cisco Clear Logs

Clear command history in network OS which is used for defense evasion

Ciscoaaa
TA0005 · Defense EvasionT1070.003 · Clear Command History
Austin ClarkMon Aug 12network
Detectionlowtest

Cisco Collect Data

Collect pertinent data from the configuration files

Ciscoaaa
TA0007 · DiscoveryTA0006 · Credential AccessTA0009 · CollectionT1087.001 · Local Account+2
Austin ClarkSun Aug 11network
Detectionhightest

Cisco Crypto Commands

Show when private keys are being exported from the device, or when new certificates are installed

Ciscoaaa
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root CertificateT1552.004 · Private Keys
Austin ClarkMon Aug 12network
Detectionhightest

Cisco Disabling Logging

Turn off logging locally or remote

Ciscoaaa
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin ClarkSun Aug 11network
Detectionlowtest

Cisco Discovery

Find information about network devices that is not stored in config files

Ciscoaaa
TA0007 · DiscoveryT1083 · File and Directory DiscoveryT1201 · Password Policy DiscoveryT1057 · Process Discovery+6
Austin ClarkMon Aug 12network
Detectionmediumtest

Cisco Denial of Service

Detect a system being shutdown or put into different boot mode

Ciscoaaa
TA0040 · ImpactT1495 · Firmware CorruptionT1529 · System Shutdown/RebootT1565.001 · Stored Data Manipulation
Austin ClarkThu Aug 15network
Detectionmediumtest

Cisco File Deletion

See what files are being deleted from flash file systems

Ciscoaaa
TA0005 · Defense EvasionTA0040 · ImpactT1070.004 · File DeletionT1561.001 · Disk Content Wipe+1
Austin ClarkMon Aug 12network
Detectionmediumtest

Cisco Show Commands Input

See what commands are being input into the device by other people, full credentials can be in the history

Ciscoaaa
TA0006 · Credential AccessT1552.003 · Bash History
Austin ClarkSun Aug 11network
Detectionhightest

Cisco Local Accounts

Find local accounts being created or modified as well as remote authentication configurations

Ciscoaaa
TA0004 · Privilege EscalationTA0003 · PersistenceT1136.001 · Local AccountT1098 · Account Manipulation
Austin ClarkMon Aug 12network
Detectionmediumtest

Cisco Modify Configuration

Modifications to a config that will serve an adversary's impacts or persistence

Ciscoaaa
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0040 · Impact+4
Austin ClarkMon Aug 12network
Detectionlowtest

Cisco Stage Data

Various protocols maybe used to put data on the device for exfil or infil

Ciscoaaa
TA0009 · CollectionTA0008 · Lateral MovementTA0011 · Command and ControlTA0010 · Exfiltration+3
Austin ClarkMon Aug 12network
Detectionmediumtest

Cisco Sniffing

Show when a monitor or a span/rspan is setup or modified

Ciscoaaa
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Austin ClarkSun Aug 11network
Detectionlowtest

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

Ciscobgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Cisco LDP Authentication Failures

Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels

Ciscoldp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionhightest

DNS Query to External Service Interaction Domains

Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE

dns
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0043 · ReconnaissanceT1595.002 · Vulnerability Scanning
Florian Roth (Nextron Systems)+1Tue Jun 07network
Detectioncriticaltest

Cobalt Strike DNS Beaconing

Detects suspicious DNS queries known from Cobalt Strike beacons

dns
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionmediumtest

Suspicious DNS Query with B64 Encoded String

Detects suspicious DNS queries using base64 encoding

dns
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionmediumtest

Telegram Bot API Request

Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind

dns
TA0011 · Command and ControlT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05network
Detectionhightest

DNS TXT Answer with Possible Execution Strings

Detects strings used in command execution in DNS TXT Answer

dns
TA0011 · Command and ControlT1071.004 · DNS
Markus NeisWed Aug 08network
Detectionhightest

Wannacry Killswitch Domain

Detects wannacry killswitch domain dns queries

dns
TA0011 · Command and ControlT1071.001 · Web Protocols
Mike WadeWed Sep 16network
Detectionlowstable

Cleartext Protocol Usage

Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels. Ensure that an encryption is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access.

Firewall
TA0006 · Credential Access
Alexandr Yampolskyi+2Tue Mar 26network
Detectionmediumexperimental

FortiGate - New Administrator Account Created

Detects the creation of an administrator account on a Fortinet FortiGate Firewall.

fortigateevent
TA0003 · PersistenceT1136.001 · Local Account
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - Firewall Address Object Added

Detects the addition of firewall address objects on a Fortinet FortiGate Firewall.

fortigateevent
TA0005 · Defense EvasionT1562 · Impair Defenses
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - New Firewall Policy Added

Detects the addition of a new firewall policy on a Fortinet FortiGate Firewall.

fortigateevent
TA0005 · Defense EvasionT1562 · Impair Defenses
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - New Local User Created

Detects the creation of a new local user on a Fortinet FortiGate Firewall. The new local user could be used for VPN connections.

fortigateevent
TA0003 · PersistenceT1136.001 · Local Account
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - New VPN SSL Web Portal Added

Detects the addition of a VPN SSL Web Portal on a Fortinet FortiGate Firewall. This behavior was observed in pair with modification of VPN SSL settings.

fortigateevent
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - User Group Modified

Detects the modification of a user group on a Fortinet FortiGate Firewall. The group could be used to grant VPN access to a network.

fortigateevent
TA0003 · PersistenceTA0004 · Privilege Escalation
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - VPN SSL Settings Modified

Detects the modification of VPN SSL Settings (for example, the modification of authentication rules). This behavior was observed in pair with the addition of a VPN SSL Web Portal.

fortigateevent
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionlowtest

Huawei BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing.

huaweibgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Juniper BGP Missing MD5

Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.

Juniperbgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionmediumtest

MITRE BZAR Indicators for Execution

Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE

Zeek (Bro)dce_rpc
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionT1047 · Windows Management Instrumentation+2
@neu5ron+1Thu Mar 19network
Detectionmediumtest

MITRE BZAR Indicators for Persistence

Windows DCE-RPC functions which indicate a persistence techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE.

Zeek (Bro)dce_rpc
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.004 · Winlogon Helper DLL
@neu5ron+1Thu Mar 19network
Detectionmediumtest

Potential PetitPotam Attack Via EFS RPC Calls

Detects usage of the windows RPC library Encrypting File System Remote Protocol (MS-EFSRPC). Variations of this RPC are used within the attack refereed to as PetitPotam. The usage of this RPC function should be rare if ever used at all. Thus usage of this function is uncommon enough that any usage of this RPC function should warrant further investigation to determine if it is legitimate. View surrounding logs (within a few minutes before and after) from the Source IP to. Logs from from the Source IP would include dce_rpc, smb_mapping, smb_files, rdp, ntlm, kerberos, etc..'

Zeek (Bro)dce_rpc
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB RelayT1187 · Forced Authentication
@neu5ron+2Tue Aug 17network
Detectionmediumtest

SMB Spoolss Name Piped Usage

Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.

Zeek (Bro)smb_files
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
OTR (Open Threat Research)Wed Nov 28network
Detectionhightest

Default Cobalt Strike Certificate

Detects the presence of default Cobalt Strike certificate in the HTTPS traffic

Zeek (Bro)x509
TA0011 · Command and ControlS0154 · Cobalt Strike
Bhabesh RajWed Jun 23network
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

Zeek (Bro)dns
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20network
Detectionlowtest

DNS Events Related To Mining Pools

Identifies clients that may be performing DNS lookups associated with common currency mining pools.

Zeek (Bro)dns
TA0002 · ExecutionT1569.002 · Service ExecutionTA0040 · ImpactT1496 · Resource Hijacking
Saw Winn Naung+1Thu Aug 19network
Detectionlowtest

New Kind of Network (NKN) Detection

NKN is a networking service using blockchain technology to support a decentralized network of peers. While there are legitimate uses for it, it can also be used as a C2 channel. This rule looks for a DNS request to the ma>

Zeek (Bro)dns
TA0011 · Command and Control
Michael PorteraThu Apr 21network
Detectionmediumtest

Suspicious DNS Z Flag Bit Set

The DNS Z flag is bit within the DNS protocol header that is, per the IETF design, meant to be used reserved (unused). Although recently it has been used in DNSSec, the value being set to anything other than 0 should be rare. Otherwise if it is set to non 0 and DNSSec is being used, then excluding the legitimate domains is low effort and high reward. Determine if multiple of these files were accessed in a short period of time to further enhance the possibility of seeing if this was a one off or the possibility of larger sensitive file gathering. This Sigma query is designed to accompany the Corelight Threat Hunting Guide, which can be found here: https://www3.corelight.com/corelights-introductory-guide-to-threat-hunting-with-zeek-bro-logs'

Zeek (Bro)dns
T1095 · Non-Application Layer ProtocolT1571 · Non-Standard PortTA0011 · Command and Control
@neu5ron+2Tue May 04network