Rule Library

Sigma Rules

143 rules found for "collection"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Bitbucket Full Data Export Triggered

Detects when full data export is attempted.

bitbucketaudit
TA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Full Data Export Triggered

Detects when full data export is attempted an unauthorized user.

bitbucketaudit
TA0009 · CollectionTA0042 · Resource DevelopmentT1213.003 · Code RepositoriesT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Details Export Attempt Detected

Detects user data export activity.

bitbucketaudit
TA0009 · CollectionTA0043 · ReconnaissanceTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Permissions Export Attempt

Detects user permission data export attempt.

bitbucketaudit
TA0043 · ReconnaissanceTA0009 · CollectionTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Github Delete Action Invoked

Detects delete action in the Github audit logs for codespaces, environment, project and repo.

githubaudit
TA0040 · ImpactTA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalThu Jan 19application
Detectionmediumtest

Github Outside Collaborator Detected

Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.

githubaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0009 · CollectionT1098.001 · Additional Cloud Credentials+2
Muhammad FaisalFri Jan 20application
Detectionlowexperimental

GitHub Repository Pages Site Changed to Public

Detects when a GitHub Pages site of a repository is made public. This usually is part of a publishing process but could indicate or lead to potential unauthorized exposure of sensitive information or code.

githubaudit
TA0009 · CollectionTA0010 · ExfiltrationT1567.001 · Exfiltration to Code Repository
Ivan SaakovSat Oct 18application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionhightest

OpenCanary - GIT Clone Request

Detects instances where a GIT service on an OpenCanary node has had Git Clone request.

opencanaryapplication
TA0009 · CollectionT1213 · Data from Information Repositories
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - MSSQL Login Attempt Via SQLAuth

Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using SQLAuth.

opencanaryapplication
TA0006 · Credential AccessTA0009 · CollectionT1003 · OS Credential DumpingT1213 · Data from Information Repositories
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - MSSQL Login Attempt Via Windows Authentication

Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using Windows Authentication.

opencanaryapplication
TA0006 · Credential AccessTA0009 · CollectionT1003 · OS Credential DumpingT1213 · Data from Information Repositories
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - MySQL Login Attempt

Detects instances where a MySQL service on an OpenCanary node has had a login attempt.

opencanaryapplication
TA0006 · Credential AccessTA0009 · CollectionT1003 · OS Credential DumpingT1213 · Data from Information Repositories
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - REDIS Action Command Attempt

Detects instances where a REDIS service on an OpenCanary node has had an action command attempted.

opencanaryapplication
TA0006 · Credential AccessTA0009 · CollectionT1003 · OS Credential DumpingT1213 · Data from Information Repositories
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - SIP Request

Detects instances where an SIP service on an OpenCanary node has had a SIP request.

opencanaryapplication
TA0009 · CollectionT1123 · Audio Capture
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - SMB File Open Request

Detects instances where an SMB service on an OpenCanary node has had a file open request.

opencanaryapplication
TA0008 · Lateral MovementTA0009 · CollectionT1021 · Remote ServicesT1005 · Data from Local System
Security Onion SolutionsFri Mar 08application
Detectionlowtest

AWS EC2 VM Export Failure

An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.

AWScloudtrail
TA0009 · CollectionT1005 · Data from Local SystemTA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Diogo BrazThu Apr 16cloud
Detectionmediumtest

Azure Firewall Rule Collection Modified or Deleted

Identifies when Rule Collections (Application, NAT, and Network) is being modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerSun Aug 08cloud
Detectionhightest

Suspicious Inbox Forwarding Identity Protection

Indicates suspicious rules such as an inbox rule that forwards a copy of all emails to an external address

Azureriskdetection
T1114.003 · Email Forwarding RuleTA0009 · Collection
Mark Morowczynski+1Sun Sep 03cloud
Detectionmediumtest

Google Full Network Traffic Packet Capture

Identifies potential full network packet capture in gcp. This feature can potentially be abused to read sensitive data from unencrypted internal traffic.

Google Cloudgcp.audit
TA0009 · CollectionT1074 · Data Staged
Austin SongerFri Aug 13cloud
Detectionmediumtest

PST Export Alert Using eDiscovery Alert

Alert on when a user has performed an eDiscovery search or exported a PST file from the search. This PST file usually has sensitive information including email body content

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Sorina IonescuTue Feb 08cloud
Detectionmediumtest

PST Export Alert Using New-ComplianceSearchAction

Alert when a user has performed an export to a search using 'New-ComplianceSearchAction' with the '-Export' flag. This detection will detect PST export even if the 'eDiscovery search or exported' alert is disabled in the O365.This rule will apply to ExchangePowerShell usage and from the cloud.

Microsoft 365threat_management
TA0009 · CollectionT1114 · Email Collection
Nikita KhalimonenkovThu Nov 17cloud
Detectionlowtest

Clipboard Collection with Xclip Tool - Auditd

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Sep 24linux
Detectionlowtest

Clipboard Collection of Image Data with Xclip Tool

Detects attempts to collect image data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

Linuxauditd
TA0009 · CollectionT1115 · Clipboard Data
Pawel MazurFri Oct 01linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Screen Capture with Import Tool

Detects adversary creating screen capture of a desktop with Import Tool. Highly recommended using rule on servers, due to high usage of screenshot utilities on user workstations. ImageMagick must be installed.

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurTue Sep 21linux
Detectionlowtest

Screen Capture with Xwd

Detects adversary creating screen capture of a full with xwd. Highly recommended using rule on servers, due high usage of screenshot utilities on user workstations

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurMon Sep 13linux
Detectionlowtest

Audio Capture

Detects attempts to record audio using the arecord and ecasound utilities.

Linuxauditd
TA0009 · CollectionT1123 · Audio Capture
Pawel Mazur+1Sat Sep 04linux
Detectionhightest

Linux Keylogging with Pam.d

Detect attempt to enable auditing of TTY input

Linuxauditd
TA0009 · CollectionTA0006 · Credential AccessT1003 · OS Credential DumpingT1056.001 · Keylogging
Pawel MazurMon May 24linux
Detectionlowtest

Clipboard Collection with Xclip Tool

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

LinuxProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
Pawel Mazur+3Fri Oct 15linux
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Linux

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

LinuxProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0002 · ExecutionTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25linux
Detectionhightest

Clipboard Data Collection Via OSAScript

Detects possible collection of data from the clipboard via execution of the osascript binary

macOSProcess Creation
TA0009 · CollectionTA0002 · ExecutionT1115 · Clipboard DataT1059.002 · AppleScript
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionlowtest

GUI Input Capture - macOS

Detects attempts to use system dialog prompts to capture user credentials

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1056.002 · GUI Input Capture
remotephone+1Tue Oct 13macos
Detectionmediumtest

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

macOSProcess Creation
TA0001 · Initial AccessTA0009 · CollectionT1566.001 · Spearphishing AttachmentT1560.001 · Archive via Utility
Omar KhaledSat Aug 10macos
Detectionlowtest

Screen Capture - macOS

Detects attempts to use screencapture to collect macOS screenshots

macOSProcess Creation
TA0009 · CollectionT1113 · Screen Capture
remotephone+1Tue Oct 13macos
Detectionlowtest

Cisco Collect Data

Collect pertinent data from the configuration files

Ciscoaaa
TA0007 · DiscoveryTA0006 · Credential AccessTA0009 · CollectionT1087.001 · Local Account+2
Austin ClarkSun Aug 11network
Detectionlowtest

Cisco Stage Data

Various protocols maybe used to put data on the device for exfil or infil

Ciscoaaa
TA0009 · CollectionTA0008 · Lateral MovementTA0011 · Command and ControlTA0010 · Exfiltration+3
Austin ClarkMon Aug 12network
Detectionlowtest

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

Ciscobgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Cisco LDP Authentication Failures

Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels

Ciscoldp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Huawei BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing.

huaweibgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Juniper BGP Missing MD5

Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.

Juniperbgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionmediumtest

Potential PetitPotam Attack Via EFS RPC Calls

Detects usage of the windows RPC library Encrypting File System Remote Protocol (MS-EFSRPC). Variations of this RPC are used within the attack refereed to as PetitPotam. The usage of this RPC function should be rare if ever used at all. Thus usage of this function is uncommon enough that any usage of this RPC function should warrant further investigation to determine if it is legitimate. View surrounding logs (within a few minutes before and after) from the Source IP to. Logs from from the Source IP would include dce_rpc, smb_mapping, smb_files, rdp, ntlm, kerberos, etc..'

Zeek (Bro)dce_rpc
TA0009 · CollectionTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB RelayT1187 · Forced Authentication
@neu5ron+2Tue Aug 17network
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

Zeek (Bro)dns
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20network
Detectionmediumtest

Suspicious Access to Sensitive File Extensions - Zeek

Detects known sensitive file extensions via Zeek

Zeek (Bro)smb_files
TA0009 · Collection
Samir BousseadenThu Apr 02network
Detectionhightest

HackTool - CobaltStrike Malleable Profile Patterns - Proxy

Detects cobalt strike malleable profiles patterns (URI, User-Agents, Methods).

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Markus Neis+1Thu Feb 15web
Detectionlowtest

Suspicious Network Communication With IPFS

Detects connections to interplanetary file system (IPFS) containing a user's email address which mirrors behaviours observed in recent phishing campaigns leveraging IPFS to host credential harvesting webpages.

Proxy Log
TA0009 · CollectionTA0006 · Credential AccessT1056 · Input Capture
Gavin KnappThu Mar 16web
Detectionmediumtest

Backup Catalog Deleted

Detects backup catalog deletions

Windowsapplication
TA0005 · Defense EvasionT1070.004 · File Deletion
Florian Roth (Nextron Systems)+1Fri May 12windows
Detectionmediumtest

Potential Active Directory Reconnaissance/Enumeration Via LDAP

Detects potential Active Directory enumeration via LDAP

Windowsldap
TA0007 · DiscoveryT1069.002 · Domain GroupsT1087.002 · Domain AccountT1482 · Domain Trust Discovery
Adeem MawaniTue Jun 22windows
Detectionhightest

RottenPotato Like Attack Pattern

Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like

Windowssecurity
TA0009 · CollectionTA0004 · Privilege EscalationTA0006 · Credential AccessT1557.001 · LLMNR/NBT-NS Poisoning and SMB Relay
@sbousseaden+1Fri Nov 15windows