Rule Library

Sigma Rules

3,116 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Bitbucket Full Data Export Triggered

Detects when full data export is attempted.

bitbucketaudit
TA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global Permission Changed

Detects global permissions change activity.

bitbucketaudit
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global Secret Scanning Rule Deleted

Detects Bitbucket global secret scanning rule deletion activity.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Global SSH Settings Changed

Detects Bitbucket global SSH access configuration changes.

bitbucketaudit
TA0008 · Lateral MovementTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1021.004 · SSH
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket Audit Log Configuration Updated

Detects changes to the bitbucket audit log configuration.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Project Secret Scanning Allowlist Added

Detects when a secret scanning allowlist rule is added for projects.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionhightest

Bitbucket Secret Scanning Exempt Repository Added

Detects when a repository is exempted from secret scanning feature.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectionlowtest

Bitbucket Secret Scanning Rule Deleted

Detects when secret scanning rule is deleted for the project or repository.

bitbucketaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Access To A Resource

Detects unauthorized access attempts to a resource.

bitbucketaudit
TA0042 · Resource DevelopmentT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Full Data Export Triggered

Detects when full data export is attempted an unauthorized user.

bitbucketaudit
TA0009 · CollectionTA0042 · Resource DevelopmentT1213.003 · Code RepositoriesT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Details Export Attempt Detected

Detects user data export activity.

bitbucketaudit
TA0009 · CollectionTA0043 · ReconnaissanceTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure

Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+3
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure Via SSH

Detects SSH user login access failures. Please note that this rule can be noisy and is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0008 · Lateral MovementTA0006 · Credential AccessT1021.004 · SSHT1110 · Brute Force
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Permissions Export Attempt

Detects user permission data export attempt.

bitbucketaudit
TA0043 · ReconnaissanceTA0009 · CollectionTA0007 · DiscoveryT1213 · Data from Information Repositories+2
Muhammad FaisalSun Feb 25application
Detectionmediumstable

Django Framework Exceptions

Detects suspicious Django web application framework exceptions that could indicate exploitation attempts

djangoapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Thomas PatzkeSat Aug 05application
Detectionmediumtest

Github Delete Action Invoked

Detects delete action in the Github audit logs for codespaces, environment, project and repo.

githubaudit
TA0040 · ImpactTA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalThu Jan 19application
Detectionhightest

Outdated Dependency Or Vulnerability Alert Disabled

Dependabot performs a scan to detect insecure dependencies, and sends Dependabot alerts. This rule detects when an organization owner disables Dependabot alerts private repositories or Dependabot security updates for all repositories.

githubaudit
TA0001 · Initial AccessT1195.001 · Compromise Software Dependencies and Development Tools
Muhammad FaisalFri Jan 27application
Detectionhightest

Github High Risk Configuration Disabled

Detects when a user disables a critical security feature for an organization.

githubaudit
TA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · PersistenceT1556 · Modify Authentication Process
Muhammad FaisalSun Jan 29application
Detectionmediumtest

Github Fork Private Repositories Setting Enabled/Cleared

Detects when the policy allowing forks of private and internal repositories is changed (enabled or cleared).

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectioninformationaltest

New Github Organization Member Added

Detects when a new member is added or invited to a github organization.

githubaudit
TA0003 · PersistenceT1136.003 · Cloud Account
Muhammad FaisalSun Jan 29application
Detectionlowtest

Github New Secret Created

Detects when a user creates action secret for the organization, environment, codespaces or repository.

githubaudit
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationTA0001 · Initial Access+1
Muhammad FaisalFri Jan 20application
Detectionmediumtest

Github Outside Collaborator Detected

Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.

githubaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0009 · CollectionT1098.001 · Additional Cloud Credentials+2
Muhammad FaisalFri Jan 20application
Detectionlowexperimental

GitHub Repository Pages Site Changed to Public

Detects when a GitHub Pages site of a repository is made public. This usually is part of a publishing process but could indicate or lead to potential unauthorized exposure of sensitive information or code.

githubaudit
TA0009 · CollectionTA0010 · ExfiltrationT1567.001 · Exfiltration to Code Repository
Ivan SaakovSat Oct 18application
Detectionlowtest

Github Push Protection Bypass Detected

Detects when a user bypasses the push protection on a secret detected by secret scanning.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionhightest

Github Push Protection Disabled

Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionlowexperimental

GitHub Repository Archive Status Changed

Detects when a GitHub repository is archived or unarchived, which may indicate unauthorized changes to repository status.

githubaudit
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · Impact
Ivan SaakovSat Oct 18application
Detectionmediumtest

Github Repository/Organization Transferred

Detects when a repository or an organization is being transferred to another location.

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectionhightest

Github Secret Scanning Feature Disabled

Detects if the secret scanning feature is disabled for an enterprise or repository.

githubaudit
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Muhammad FaisalThu Mar 07application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionmediumtest

Github SSH Certificate Configuration Changed

Detects when changes are made to the SSH certificate configuration of the organization.

githubaudit
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Romain GaillardMon Jul 29application
Detectionhightest

Potential JNDI Injection Exploitation In JVM Based Application

Detects potential JNDI Injection exploitation. Often coupled with Log4Shell exploitation.

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionhightest

Potential Local File Read Vulnerability In JVM Based Application

Detects potential local file read vulnerability in JVM based apps. If the exceptions are caused due to user input and contain path traversal payloads then it's a red flag.

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionhightest

Potential OGNL Injection Exploitation In JVM Based Application

Detects potential OGNL Injection exploitation, which may lead to RCE. OGNL is an expression language that is supported in many JVM based systems. OGNL Injection is the reason for some high profile RCE's such as Apache Struts (CVE-2017-5638) and Confluence (CVE-2022-26134)

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2017-5638cve.2022-26134
Moti HarmatsSat Feb 11application
Detectionhightest

Process Execution Error In JVM Based Application

Detects process execution related exceptions in JVM based apps, often relates to RCE

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionhightest

Potential XXE Exploitation Attempt In JVM Based Application

Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.

jvmapplication
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Moti HarmatsSat Feb 11application
Detectionmediumtest

Kubernetes Admission Controller Modification

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

Kubernetesaudit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Kubernetesaudit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
kelnageThu Jul 11application
Detectionlowtest

Deployment Deleted From Kubernetes Cluster

Detects the removal of a deployment from a Kubernetes cluster. This could indicate disruptive activity aiming to impact business operations.

Kubernetesapplicationaudit
T1498 · Network Denial of ServiceTA0040 · Impact
Leo TsaousisTue Mar 26application
Detectionmediumtest

Kubernetes Events Deleted

Detects when events are deleted in Kubernetes. An adversary may delete Kubernetes events in an attempt to evade detection.

Kubernetesapplicationaudit
TA0005 · Defense EvasionT1070 · Indicator Removal
Leo TsaousisTue Mar 26application
Detectionmediumtest

Potential Remote Command Execution In Pod Container

Detects attempts to execute remote commands, within a Pod's container using e.g. the "kubectl exec" command.

Kubernetesapplicationaudit
T1609 · Container Administration CommandTA0002 · Execution
Leo TsaousisTue Mar 26application
Detectionlowtest

Container With A hostPath Mount Created

Detects creation of a container with a hostPath mount. A hostPath volume mounts a directory or a file from the node to the container. Attackers who have permissions to create a new pod in the cluster may create one with a writable hostPath volume and chroot to escape to the underlying node.

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionmediumtest

Creation Of Pod In System Namespace

Detects deployments of pods within the kube-system namespace, which could be intended to imitate system pods. System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names. Attackers can use this fact and name their backdoor pods as if they were created by these controllers to avoid detection. Deployment of such a backdoor container e.g. named kube-proxy-bv61v, could be attempted in the kube-system namespace alongside the other administrative containers.

Kubernetesapplicationaudit
TA0005 · Defense EvasionT1036.005 · Match Legitimate Name or Location
Leo TsaousisTue Mar 26application
Detectionlowtest

Privileged Container Deployed

Detects the creation of a "privileged" container, an action which could be indicative of a threat actor mounting a container breakout attacks. A privileged container is a container that can access the host with all of the root capabilities of the host machine. This allows it to view, interact and modify processes, network operations, IPC calls, the file system, mount points, SELinux configurations etc. as the root user on the host. Various versions of "privileged" containers can be specified, e.g. by setting the securityContext.privileged flag in the resource specification, setting non-standard Linux capabilities, or configuring the hostNetwork/hostPID fields

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionlowtest

RBAC Permission Enumeration Attempt

Detects identities attempting to enumerate their Kubernetes RBAC permissions. In the early stages of a breach, attackers will aim to list the permissions they have within the compromised environment. In a Kubernetes cluster, this can be achieved by interacting with the API server, and querying the SelfSubjectAccessReview API via e.g. a "kubectl auth can-i --list" command. This will enumerate the Role-Based Access Controls (RBAC) rules defining the compromised user's authorization.

Kubernetesapplicationaudit
T1069.003 · Cloud GroupsT1087.004 · Cloud AccountTA0007 · Discovery
Leo TsaousisTue Mar 26application
Detectionmediumtest

Kubernetes Rolebinding Modification

Detects when a Kubernetes Rolebinding is created or modified.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageThu Jul 11application
Detectionlowtest

Kubernetes Secrets Enumeration

Detects enumeration of Kubernetes secrets.

Kubernetesapplicationaudit
T1552.007 · Container APITA0006 · Credential Access
Leo TsaousisTue Mar 26application
Detectionmediumtest

Kubernetes Secrets Modified or Deleted

Detects when Kubernetes Secrets are Modified or Deleted.

Kubernetesaudit
TA0006 · Credential Access
kelnageThu Jul 11application
Detectionlowtest

New Kubernetes Service Account Created

Detects creation of new Kubernetes service account, which could indicate an attacker's attempt to persist within a cluster.

Kubernetesapplicationaudit
TA0003 · PersistenceT1136 · Create Account
Leo TsaousisTue Mar 26application