Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Activity from Anonymous IP Addresses

Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Infrequent Country

Detects when a Microsoft Cloud App Security reported when an activity occurs from a location that wasn't recently or never visited by any user in the organization.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Data Exfiltration to Unsanctioned Apps

Detects when a Microsoft Cloud App Security reported when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.

Microsoft 365threat_management
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Impossible Travel Activity

Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Jul 06cloud
Detectionmediumtest

Logon from a Risky IP Address

Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Potential Ransomware Activity

Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.

Microsoft 365threat_management
TA0040 · ImpactT1486 · Data Encrypted for Impact
Austin SongerThu Aug 19cloud
Detectionmediumtest

PST Export Alert Using eDiscovery Alert

Alert on when a user has performed an eDiscovery search or exported a PST file from the search. This PST file usually has sensitive information including email body content

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Sorina IonescuTue Feb 08cloud
Detectionmediumtest

PST Export Alert Using New-ComplianceSearchAction

Alert when a user has performed an export to a search using 'New-ComplianceSearchAction' with the '-Export' flag. This detection will detect PST export even if the 'eDiscovery search or exported' alert is disabled in the O365.This rule will apply to ExchangePowerShell usage and from the cloud.

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Nikita KhalimonenkovThu Nov 17cloud
Detectionlowtest

Suspicious Inbox Forwarding

Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.

Microsoft 365threat_management
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Austin SongerSun Aug 22cloud
Detectionmediumtest

Suspicious OAuth App File Download Activities

Detects when a Microsoft Cloud App Security reported when an app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual for the user.

Microsoft 365threat_management
TA0010 · Exfiltration
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Unusual Volume of File Deletion

Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.

Microsoft 365threat_management
TA0040 · ImpactT1485 · Data Destruction
Austin SongerThu Aug 19cloud
Detectionmediumtest

Microsoft 365 - User Restricted from Sending Email

Detects when a Security Compliance Center reported a user who exceeded sending limits of the service policies and because of this has been restricted from sending email.

Microsoft 365threat_management
TA0001 · Initial AccessT1199 · Trusted Relationship
Austin SongerThu Aug 19cloud
Detectionmediumtest

Cisco Duo Successful MFA Authentication Via Bypass Code

Detects when a successful MFA authentication occurs due to the use of a bypass code. A bypass code is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally used as "backup codes," so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily can't use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.

Ciscoduo
TA0006 · Credential AccessTA0005 · Defense EvasionTA0001 · Initial Access
Nikita KhalimonenkovWed Apr 17identity
Detectionmediumtest

Okta Admin Functions Access Through Proxy

Detects access to Okta admin functions through proxy.

Oktaokta
TA0006 · Credential Access
Muhammad FaisalWed Oct 25identity
Detectionmediumtest

Okta Admin Role Assigned to an User or Group

Detects when an the Administrator role is assigned to an user or group.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.003 · Additional Cloud Roles
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Admin Role Assignment Created

Detects when a new admin role assignment is created. Which could be a sign of privilege escalation or persistence

Oktaokta
TA0003 · Persistence
Nikita KhalimonenkovThu Jan 19identity
Detectionmediumtest

Okta API Token Created

Detects when a API token is created

Oktaokta
TA0003 · Persistence
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta API Token Revoked

Detects when a API Token is revoked.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Modified or Deleted

Detects when an application is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Sign-On Policy Modified or Deleted

Detects when an application Sign-on Policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionhightest

Okta FastPass Phishing Detection

Detects when Okta FastPass prevents a known phishing site.

Oktaokta
TA0001 · Initial AccessT1566 · Phishing
Austin SongerSun May 07identity
Detectionmediumtest

Okta Identity Provider Created

Detects when a new identity provider is created for Okta.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.001 · Additional Cloud Credentials
kelnageThu Sep 07identity
Detectionmediumtest

Okta MFA Reset or Deactivated

Detects when an attempt at deactivating or resetting MFA.

Oktaokta
TA0003 · PersistenceTA0006 · Credential AccessTA0005 · Defense EvasionT1556.006 · Multi-Factor Authentication
Austin SongerTue Sep 21identity
Detectionmediumtest

Okta Network Zone Deactivated or Deleted

Detects when an Network Zone is Deactivated or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionhightest

Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
kelnageThu Sep 07identity
Detectionhightest

Potential Okta Password in AlternateID Field

Detects when a user has potentially entered their password into the username field, which will cause the password to be retained in log files.

Oktaokta
TA0006 · Credential AccessT1552 · Unsecured Credentials
kelnageMon Apr 03identity
Detectionlowtest

Okta Policy Modified or Deleted

Detects when an Okta policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Policy Rule Modified or Deleted

Detects when an Policy Rule is Modified or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Security Threat Detected

Detects when an security threat is detected in Okta.

Oktaokta
TA0011 · Command and Control
Austin SongerSun Sep 12identity
Detectionhightest

Okta Suspicious Activity Reported by End-user

Detects when an Okta end-user reports activity by their account as being potentially suspicious.

Oktaokta
TA0042 · Resource DevelopmentT1586.003 · Cloud Accounts
kelnageThu Sep 07identity
Detectionmediumtest

Okta Unauthorized Access to App

Detects when unauthorized access to app occurs.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta User Account Locked Out

Detects when an user account is locked out.

Oktaokta
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSun Sep 12identity
Detectioninformationaltest

New Okta User Created

Detects new user account creation

Oktaokta
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25identity
Detectionhightest

Okta User Session Start Via An Anonymising Proxy Service

Detects when an Okta user session starts where the user is behind an anonymising proxy service.

Oktaokta
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
kelnageThu Sep 07identity
Detectionlowtest

OneLogin User Assumed Another User

Detects when an user assumed another user account.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowtest

OneLogin User Account Locked

Detects when an user account is locked or suspended.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionhightest

Binary Padding - Linux

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

Linuxauditd
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+1Tue Oct 13linux
Detectionmediumtest

Bpfdoor TCP Ports Redirect

All TCP traffic on particular port from attacker is routed to different port. ex. '/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392' The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.

Linuxauditd
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Rafal PiaseckiWed Aug 10linux
Detectionlowtest

Linux Capabilities Discovery

Detects attempts to discover the files with setuid/setgid capability on them. That would allow adversary to escalate their privileges.

Linuxauditd
TA0007 · DiscoveryTA0005 · Defense EvasionTA0004 · Privilege EscalationT1083 · File and Directory Discovery+1
Pawel MazurSun Nov 28linux
Detectionmediumtest

File Time Attribute Change - Linux

Detect file time attribute change to hide new or changes to existing files.

Linuxauditd
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Remove Immutable File Attribute - Auditd

Detects removing immutable file attribute.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionlowtest

Clipboard Collection with Xclip Tool - Auditd

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Sep 24linux
Detectionlowtest

Clipboard Collection of Image Data with Xclip Tool

Detects attempts to collect image data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Oct 01linux
Detectioncriticaltest

Possible Coin Miner CPU Priority Param

Detects command line parameter very often used with coin miners

Linuxauditd
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Florian Roth (Nextron Systems)Sat Oct 09linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionmediumtest

Data Exfiltration with Wget

Detects attempts to post the file with the usage of wget utility. The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.

Linuxauditd
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Pawel MazurThu Nov 18linux
Detectionlowtest

File or Folder Permissions Change

Detects file and folder permission changes.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionhightest

Credentials In Files - Linux

Detecting attempts to extract passwords with grep

Linuxauditd
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+1Thu Oct 15linux