Rule Library

Sigma Rules

30 rules found for "Muhammad Faisal"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Bitbucket Full Data Export Triggered

Detects when full data export is attempted.

bitbucketaudit
TA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global Permission Changed

Detects global permissions change activity.

bitbucketaudit
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global Secret Scanning Rule Deleted

Detects Bitbucket global secret scanning rule deletion activity.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global SSH Settings Changed

Detects Bitbucket global SSH access configuration changes.

bitbucketaudit
TA0008 · Lateral MovementTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1021.004 · SSH
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Audit Log Configuration Updated

Detects changes to the bitbucket audit log configuration.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Project Secret Scanning Allowlist Added

Detects when a secret scanning allowlist rule is added for projects.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionhightest

Bitbucket Secret Scanning Exempt Repository Added

Detects when a repository is exempted from secret scanning feature.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Secret Scanning Rule Deleted

Detects when secret scanning rule is deleted for the project or repository.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Access To A Resource

Detects unauthorized access attempts to a resource.

bitbucketaudit
TA0042 · Resource DevelopmentT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Full Data Export Triggered

Detects when full data export is attempted an unauthorized user.

bitbucketaudit
TA0009 · CollectionTA0042 · Resource DevelopmentT1213.003 · Code RepositoriesT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Details Export Attempt Detected

Detects user data export activity.

bitbucketaudit
TA0009 · CollectionTA0043 · ReconnaissanceTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure

Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+3
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure Via SSH

Detects SSH user login access failures. Please note that this rule can be noisy and is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0008 · Lateral MovementTA0006 · Credential AccessT1021.004 · SSHT1110 · Brute Force
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Permissions Export Attempt

Detects user permission data export attempt.

bitbucketaudit
TA0043 · ReconnaissanceTA0009 · CollectionTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Github Delete Action Invoked

Detects delete action in the Github audit logs for codespaces, environment, project and repo.

githubaudit
TA0040 · ImpactTA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalThu Jan 19application
Detectionhightest

Outdated Dependency Or Vulnerability Alert Disabled

Dependabot performs a scan to detect insecure dependencies, and sends Dependabot alerts. This rule detects when an organization owner disables Dependabot alerts private repositories or Dependabot security updates for all repositories.

githubaudit
TA0001 · Initial AccessT1195.001 · Compromise Software Dependencies and Development Tools
Muhammad FaisalFri Jan 27application
Detectionhightest

Github High Risk Configuration Disabled

Detects when a user disables a critical security feature for an organization.

githubaudit
TA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · PersistenceT1556 · Modify Authentication Process
Muhammad FaisalSun Jan 29application
Detectioninformationaltest

New Github Organization Member Added

Detects when a new member is added or invited to a github organization.

githubaudit
TA0003 · PersistenceT1136.003 · Cloud Account
Muhammad FaisalSun Jan 29application
Detectionlowtest

Github New Secret Created

Detects when a user creates action secret for the organization, environment, codespaces or repository.

githubaudit
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationTA0001 · Initial Access+1
Muhammad FaisalFri Jan 20application
Detectionmediumtest

Github Outside Collaborator Detected

Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.

githubaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0009 · CollectionT1098.001 · Additional Cloud Credentials+2
Muhammad FaisalFri Jan 20application
Detectionlowtest

Github Push Protection Bypass Detected

Detects when a user bypasses the push protection on a secret detected by secret scanning.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhightest

Github Push Protection Disabled

Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhightest

Github Secret Scanning Feature Disabled

Detects if the secret scanning feature is disabled for an enterprise or repository.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionmediumtest

Okta Admin Functions Access Through Proxy

Detects access to Okta admin functions through proxy.

Oktaokta
TA0006 · Credential Access
Muhammad FaisalWed Oct 25identity
Detectionmediumtest

Potential Linux Amazon SSM Agent Hijacking

Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.

LinuxProcess Creation
TA0011 · Command and ControlTA0003 · Persistenceattack.t1219.002
Muhammad FaisalThu Aug 03linux
Detectionlowexperimental

DNS Query Request By QuickAssist.EXE

Detects DNS queries initiated by "QuickAssist.exe" to Microsoft Quick Assist primary endpoint that is used to establish a session.

WindowsDNS Query
TA0011 · Command and ControlTA0001 · Initial AccessTA0008 · Lateral MovementT1071.001 · Web Protocols+1
Muhammad FaisalThu Dec 19windows
Detectionmediumtest

Potentially Suspicious Usage Of Qemu

Detects potentially suspicious execution of the Qemu utility in a Windows environment. Threat actors have leveraged this utility and this technique for achieving network access as reported by Kaspersky.

WindowsProcess Creation
TA0011 · Command and ControlT1090 · ProxyT1572 · Protocol Tunneling
Muhammad Faisal+1Mon Jun 03windows
Detectionlowexperimental

QuickAssist Execution

Detects the execution of Microsoft Quick Assist tool "QuickAssist.exe". This utility can be used by attackers to gain remote access.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Muhammad FaisalThu Dec 19windows
Detectionmediumtest

Potential Amazon SSM Agent Hijacking

Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.

WindowsProcess Creation
TA0011 · Command and ControlTA0003 · Persistenceattack.t1219.002
Muhammad FaisalWed Aug 02windows