Rule Library

Sigma Rules

3,707 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Path Traversal Exploitation Attempts

Detects path traversal exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Subhash Popuri+3Sat Sep 25web
Detectionmediumtest

Source Code Enumeration Detection by Keyword

Detects source code enumeration that use GET requests by keyword searches in URL strings

Web Server Log
TA0007 · DiscoveryT1083 · File and Directory Discovery
James AhearnSat Jun 08web
Detectionhightest

SQL Injection Strings In URI

Detects potential SQL injection attempts via GET requests in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Saw Win Naung+2Sat Feb 22web
Detectionhightest

Server Side Template Injection Strings

Detects SSTI attempts sent via GET requests in access logs

Web Server Log
TA0005 · Defense Evasionattack.t1221
Nasreddine Bencherchali (Nextron Systems)Tue Jun 14web
Detectionmediumtest

Suspicious User-Agents Related To Recon Tools

Detects known suspicious (default) user-agents related to scanning/recon tools

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 19web
Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Web Server Log
TA0003 · PersistenceTA0010 · ExfiltrationT1505.003 · Web Shell
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06web
Detectionhightest

Webshell ReGeorg Detection Via Web Logs

Certain strings in the uri_query field when combined with null referer and null user agent can indicate activity associated with the webshell ReGeorg.

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Cian HeasleyTue Aug 04web
Detectionhightest

Windows Webshell Strings

Detects common commands used in Windows webshells

Web Server Log
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Sun Feb 19web
Detectionhightest

Cross Site Scripting Strings

Detects XSS attempts injected via GET requests in access logs

Web Server Log
TA0001 · Initial AccessT1189 · Drive-by Compromise
Saw Win Naung+1Sun Aug 15web
Detectionhightest

Relevant Anti-Virus Signature Keywords In Application Log

Detects potentially highly relevant antivirus events in the application log based on known virus signature names and malware keywords.

Windowsapplication
TA0042 · Resource DevelopmentT1588 · Obtain Capabilities
Florian Roth (Nextron Systems)+1Sun Feb 19windows
Detectionhighexperimental

LSASS Process Crashed - Application

Detects Windows error reporting events where the process that crashed is LSASS (Local Security Authority Subsystem Service). This could be the cause of a provoked crash by techniques such as Lsass-Shtinkering to dump credentials.

Windowsapplication
TA0006 · Credential AccessT1003.001 · LSASS Memory
Nasreddine Bencherchali (Nextron Systems)Wed Dec 07windows
Detectionhightest

Microsoft Malware Protection Engine Crash

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionmediumtest

Ntdsutil Abuse

Detects potential abuse of ntdsutil to dump ntds.dit database

Windowsapplication
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectionmediumtest

Dump Ntds.dit To Suspicious Location

Detects potential abuse of ntdsutil to dump ntds.dit database to a suspicious location

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Sun Aug 14windows
Detectioncriticaltest

Audit CVE Event

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

Windowsapplication
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+8
Florian Roth (Nextron Systems)+1Wed Jan 15windows
Detectionmediumtest

Backup Catalog Deleted

Detects backup catalog deletions

Windowsapplication
TA0005 · Defense EvasionT1070.004 · File Deletion
Florian Roth (Nextron Systems)+1Fri May 12windows
Detectionhightest

Restricted Software Access By SRP

Detects restricted access to applications by the Software Restriction Policies (SRP) policy

Windowsapplication
TA0008 · Lateral MovementTA0002 · ExecutionTA0005 · Defense EvasionT1072 · Software Deployment Tools
François HubautThu Jan 12windows
Detectionlowtest

Application Uninstalled

An application has been removed. Check if it is critical.

Windowsapplication
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 28windows
Detectionmediumtest

MSI Installation From Suspicious Locations

Detects MSI package installation from suspicious locations

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Wed Aug 31windows
Detectionmediumtest

MSI Installation From Web

Detects installation of a remote msi file from web.

Windowsapplication
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionT1218.007 · Msiexec
Stamatis ChatzimangouSun Oct 23windows
Detectionhightest

Atera Agent Installation

Detects successful installation of Atera Remote Monitoring & Management (RMM) agent as recently found to be used by Conti operators

Windowsapplication
TA0011 · Command and Controlattack.t1219.002
Bhabesh RajWed Sep 01windows
Detectionhightest

MSSQL Add Account To Sysadmin Role

Detects when an attacker tries to backdoor the MSSQL server by adding a backdoor account to the sysadmin fixed server role

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionmediumexperimental

MSSQL Destructive Query

Detects the invocation of MS SQL transactions that are destructive towards table or database data, such as "DROP TABLE" or "DROP DATABASE".

Windowsapplication
TA0010 · ExfiltrationTA0040 · ImpactT1485 · Data Destruction
Daniel DegasperiWed Jun 04windows
Detectionhightest

MSSQL Disable Audit Settings

Detects when an attacker calls the "ALTER SERVER AUDIT" or "DROP SERVER AUDIT" transaction in order to delete or disable audit logs on the server

Windowsapplication
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionlowtest

MSSQL Server Failed Logon

Detects failed logon attempts from clients to MSSQL server.

Windowsapplication
TA0006 · Credential AccessT1110 · Brute Force
Nasreddine Bencherchali (Nextron Systems)+1Wed Oct 11windows
Detectionmediumtest

MSSQL Server Failed Logon From External Network

Detects failed logon attempts from clients with external network IP to an MSSQL server. This can be a sign of a bruteforce attack.

Windowsapplication
TA0006 · Credential AccessT1110 · Brute Force
j4sonWed Oct 11windows
Detectionhightest

MSSQL SPProcoption Set

Detects when the a stored procedure is set or cleared for automatic execution in MSSQL. A stored procedure that is set to automatic execution runs every time an instance of SQL Server is started

Windowsapplication
TA0003 · Persistence
Nasreddine Bencherchali (Nextron Systems)Wed Jul 13windows
Detectionhightest

MSSQL XPCmdshell Suspicious Execution

Detects when the MSSQL "xp_cmdshell" stored procedure is used to execute commands

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionhightest

MSSQL XPCmdshell Option Change

Detects when the MSSQL "xp_cmdshell" stored procedure setting is changed.

Windowsapplication
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Jul 12windows
Detectionlowtest

Remote Access Tool - ScreenConnect Command Execution

Detects command execution via ScreenConnect RMM

Windowsapplication
TA0002 · ExecutionT1059.003 · Windows Command Shell
Ali AlwashaliTue Oct 10windows
Detectionlowtest

Remote Access Tool - ScreenConnect File Transfer

Detects file being transferred via ScreenConnect RMM

Windowsapplication
TA0002 · ExecutionT1059.003 · Windows Command Shell
Ali AlwashaliTue Oct 10windows
Detectionhightest

Microsoft Malware Protection Engine Crash - WER

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows
Detectionmediumtest

AppLocker Prevented Application or Script from Running

Detects when AppLocker prevents the execution of an Application, DLL, Script, MSI, or Packaged-App from running.

Windowsapplocker
TA0002 · ExecutionT1204.002 · Malicious FileT1059.001 · PowerShellT1059.003 · Windows Command Shell+3
Pushkarev DmitrySun Jun 28windows
Detectionlowtest

Sysinternals Tools AppX Versions Execution

Detects execution of Sysinternals tools via an AppX package. Attackers could install the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths.

Windowsappmodel-runtime
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

Deployment AppX Package Was Blocked By AppLocker

Detects an appx package deployment that was blocked by AppLocker policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionhightest

Remote AppX Package Downloaded from File Sharing or CDN Domain

Detects an appx package that was added to the pipeline of the "to be processed" packages which was downloaded from a file sharing or CDN domain.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

AppX Package Deployment Failed Due to Signing Requirements

Detects an appx package deployment / installation with the error code "0x80073cff" which indicates that the package didn't meet the signing requirements.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionhightest

AppX Located in Known Staging Directory Added to Deployment Pipeline

Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in a known folder often used as a staging directory.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

Potential Malicious AppX Package Installation Attempts

Detects potential installation or installation attempts of known malicious appx packages

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumtest

Deployment Of The AppX Package Was Blocked By The Policy

Detects an appx package deployment that was blocked by the local computer policy. The following events indicate that an AppX package deployment was blocked by a policy: - Event ID 441: The package deployment operation is blocked by the "Allow deployment operations in special profiles" policy - Event ID 442: Deployments to non-system volumes are blocked by the "Disable deployment of Windows Store apps to non-system volumes" policy." - Event ID 453: Package blocked by a platform policy. - Event ID 454: Package blocked by a platform policy.

Windowsappxdeployment-server
TA0005 · Defense Evasion
François HubautWed Jan 11windows
Detectionmediumtest

AppX Located in Uncommon Directory Added to Deployment Pipeline

Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in uncommon locations.

Windowsappxdeployment-server
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 11windows
Detectionmediumexperimental

Windows AppX Deployment Full Trust Package Installation

Detects the installation of MSIX/AppX packages with full trust privileges which run with elevated privileges outside normal AppX container restrictions

Windowsappxdeployment-server
TA0005 · Defense EvasionTA0002 · ExecutionT1204.002 · Malicious FileT1553.005 · Mark-of-the-Web Bypass
Michael Haag+1Mon Nov 03windows
Detectionmediumexperimental

Windows AppX Deployment Unsigned Package Installation

Detects attempts to install unsigned MSIX/AppX packages using the -AllowUnsigned parameter via AppXDeployment-Server events

Windowsappxdeployment-server
TA0005 · Defense EvasionTA0002 · ExecutionT1204.002 · Malicious FileT1553.005 · Mark-of-the-Web Bypass
Michael Haag+1Mon Nov 03windows
Detectionmediumtest

Suspicious Digital Signature Of AppX Package

Detects execution of AppX packages with known suspicious or malicious signature

Windowsappxpackaging-om
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionlowtest

New BITS Job Created Via Bitsadmin

Detects the creation of a new bits job by Bitsadmin

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionlowtest

New BITS Job Created Via PowerShell

Detects the creation of a new bits job by PowerShell

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionmediumtest

BITS Transfer Job Downloading File Potential Suspicious Extension

Detects new BITS transfer job saving local files with potential suspicious extensions

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
François HubautTue Mar 01windows
Detectionhightest

BITS Transfer Job Download From File Sharing Domains

Detects BITS transfer job downloading files from a file sharing domain.

Windowsbits-client
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS Jobs
Florian Roth (Nextron Systems)Tue Jun 28windows