Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionlowtest

Suspicious Network Communication With IPFS

Detects connections to interplanetary file system (IPFS) containing a user's email address which mirrors behaviours observed in recent phishing campaigns leveraging IPFS to host credential harvesting webpages.

Proxy Log
TA0009 · CollectionTA0006 · Credential AccessT1056 · Input Capture
Gavin KnappThu Mar 16web
Detectionmediumtest

Telegram API Access

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05web
Detectionhightest

APT User Agent

Detects suspicious user agent strings used in APT malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Tue Nov 12web
Detectionmediumtest

Suspicious Base64 Encoded User-Agent

Detects suspicious encoded User-Agent strings, as seen used by some malware.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu May 04web
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionhightest

Crypto Miner User Agent

Detects suspicious user agent strings used by crypto miners in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Oct 21web
Detectionmediumtest

HTTP Request With Empty User Agent

Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Exploit Framework User Agent

Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Hack Tool User Agent

Detects suspicious user agent strings user by hack tools in proxy logs

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0006 · Credential AccessT1110 · Brute Force
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+2Sat Jul 08web
Detectionmediumtest

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionmediumtest

Rclone Activity via Proxy

Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string

Proxy Log
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Janantha MarasingheTue Oct 18web
Detectionhightest

Suspicious User Agent

Detects suspicious malformed user agent strings in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionmediumtest

Potential Base64 Encoded User-Agent

Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Fri Jul 08web
Detectionhightest

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

Proxy Log
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing
Ahmed FaroukFri May 10web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Webserver

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Web Server Log
TA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationTA0001 · Initial Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionmediumtest

Successful IIS Shortname Fuzzing Scan

When IIS uses an old .Net Framework it's possible to enumerate folders with the symbol "~"

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François HubautWed Oct 06web
Detectionhightest

Java Payload Strings

Detects possible Java payloads in web access logs

Web Server Log
cve.2022-26134cve.2021-26084TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François Hubaut+2Sat Jun 04web
Detectionhightest

JNDIExploit Pattern

Detects exploitation attempt using the JNDI-Exploit-Kit

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Sun Dec 12web
Detectionmediumtest

Path Traversal Exploitation Attempts

Detects path traversal exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Subhash Popuri+3Sat Sep 25web
Detectionmediumtest

Source Code Enumeration Detection by Keyword

Detects source code enumeration that use GET requests by keyword searches in URL strings

Web Server Log
TA0007 · DiscoveryT1083 · File and Directory Discovery
James AhearnSat Jun 08web
Detectionhightest

SQL Injection Strings In URI

Detects potential SQL injection attempts via GET requests in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Saw Win Naung+2Sat Feb 22web
Detectionhightest

Server Side Template Injection Strings

Detects SSTI attempts sent via GET requests in access logs

Web Server Log
TA0005 · Defense Evasionattack.t1221
Nasreddine Bencherchali (Nextron Systems)Tue Jun 14web
Detectionmediumtest

Suspicious User-Agents Related To Recon Tools

Detects known suspicious (default) user-agents related to scanning/recon tools

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 19web
Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Web Server Log
TA0003 · PersistenceTA0010 · ExfiltrationT1505.003 · Web Shell
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06web
Detectionhightest

Webshell ReGeorg Detection Via Web Logs

Certain strings in the uri_query field when combined with null referer and null user agent can indicate activity associated with the webshell ReGeorg.

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Cian HeasleyTue Aug 04web
Detectionhightest

Windows Webshell Strings

Detects common commands used in Windows webshells

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Sun Feb 19web
Detectionhightest

Cross Site Scripting Strings

Detects XSS attempts injected via GET requests in access logs

Web Server Log
TA0001 · Initial AccessT1189 · Drive-by Compromise
Saw Win Naung+1Sun Aug 15web
Detectionhightest

Relevant Anti-Virus Signature Keywords In Application Log

Detects potentially highly relevant antivirus events in the application log based on known virus signature names and malware keywords.

Windowsapplication
TA0042 · Resource DevelopmentT1588 · Obtain Capabilities
Florian Roth (Nextron Systems)+1Sun Feb 19windows
Detectionhightest

Microsoft Malware Protection Engine Crash

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionmediumtest

Ntdsutil Abuse

Detects potential abuse of ntdsutil to dump ntds.dit database

Windowsapplication
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectionmediumtest

Dump Ntds.dit To Suspicious Location

Detects potential abuse of ntdsutil to dump ntds.dit database to a suspicious location

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectioncriticaltest

Audit CVE Event

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

Windowsapplication
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+8
Florian Roth (Nextron Systems)+1Wed Jan 15windows
Detectionmediumtest

Backup Catalog Deleted

Detects backup catalog deletions

Windowsapplication
TA0005 · Defense EvasionT1070.004 · File Deletion
Florian Roth (Nextron Systems)+1Fri May 12windows
Detectionhightest

Restricted Software Access By SRP

Detects restricted access to applications by the Software Restriction Policies (SRP) policy

Windowsapplication
TA0008 · Lateral MovementTA0002 · ExecutionTA0005 · Defense EvasionT1072 · Software Deployment Tools
François HubautThu Jan 12windows
Detectionlowtest

Application Uninstalled

An application has been removed. Check if it is critical.

Windowsapplication
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 28windows
Detectionmediumtest

MSI Installation From Suspicious Locations

Detects MSI package installation from suspicious locations

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionmediumtest

MSI Installation From Web

Detects installation of a remote msi file from web.

Windowsapplication
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1218.007 · Msiexec
Stamatis ChatzimangouSun Oct 23windows
Detectionhightest

Atera Agent Installation

Detects successful installation of Atera Remote Monitoring & Management (RMM) agent as recently found to be used by Conti operators

Windowsapplication
TA0011 · Command and Controlattack.t1219.002
Bhabesh RajWed Sep 01windows
Detectionhightest

MSSQL Add Account To Sysadmin Role

Detects when an attacker tries to backdoor the MSSQL server by adding a backdoor account to the sysadmin fixed server role

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL Disable Audit Settings

Detects when an attacker calls the "ALTER SERVER AUDIT" or "DROP SERVER AUDIT" transaction in order to delete or disable audit logs on the server

Windowsapplication
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionlowtest

MSSQL Server Failed Logon

Detects failed logon attempts from clients to MSSQL server.

Windowsapplication
TA0006 · Credential AccessT1110 · Brute Force
Nasreddine Bencherchali (Nextron Systems)+1Wed Oct 11windows
Detectionmediumtest

MSSQL Server Failed Logon From External Network

Detects failed logon attempts from clients with external network IP to an MSSQL server. This can be a sign of a bruteforce attack.

Windowsapplication
TA0006 · Credential AccessT1110 · Brute Force
j4sonWed Oct 11windows
Detectionhightest

MSSQL SPProcoption Set

Detects when the a stored procedure is set or cleared for automatic execution in MSSQL. A stored procedure that is set to automatic execution runs every time an instance of SQL Server is started

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL XPCmdshell Suspicious Execution

Detects when the MSSQL "xp_cmdshell" stored procedure is used to execute commands

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

MSSQL XPCmdshell Option Change

Detects when the MSSQL "xp_cmdshell" stored procedure setting is changed.

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows