Critical Infrastructure Cybersecurity Framework
HomeDetection Rules

Detection Rules

Sigma & YARA Signatures

Pre-built detection rules mapped to MITRE ATT&CK techniques. Deploy these signatures in your SIEM, EDR, and malware analysis tools.

16
Sigma Rules
10
YARA Rules
5
Critical Detections
30
Techniques Covered
SIGMA-003HIGHstable

PowerShell Download Cradle

Detects PowerShell commands that download and execute code from the internet

SIGMA-007HIGHstable

Windows Event Log Cleared

Detects clearing of Windows event logs to hide malicious activity

SIGMA-008HIGHstable

Disable Windows Defender

Detects attempts to disable Windows Defender

SIGMA-004MEDIUMstable

Suspicious WMIC Execution

Detects suspicious WMIC commands often used for reconnaissance and execution

SIGMA-005MEDIUMstable

Registry Run Key Modification

Detects modifications to registry run keys for persistence

SIGMA-009MEDIUMstable

PsExec Execution

Detects PsExec usage for remote execution

SIGMA-012MEDIUMstable

Active Directory Enumeration

Detects Active Directory enumeration using common tools

SIGMA-013MEDIUMexperimental

DNS Tunneling

Detects potential DNS tunneling based on query patterns

SIGMA-006LOWstable

Scheduled Task Creation

Detects creation of scheduled tasks which may be used for persistence

SIGMA-010LOWstable

Remote Desktop Connection

Detects RDP connections which may indicate lateral movement

SIGMA-011LOWstable

Network Share Discovery

Detects enumeration of network shares

SIGMA-001CRITICALstable

Mimikatz Command Line

Detects Mimikatz command line arguments commonly used for credential dumping

SIGMA-002CRITICALstable

LSASS Memory Dump

Detects attempts to dump LSASS process memory for credential extraction

SIGMA-014CRITICALstable

Cobalt Strike Beacon

Detects Cobalt Strike beacon communication patterns

SIGMA-015CRITICALstable

Volume Shadow Copy Deletion

Detects deletion of volume shadow copies often performed by ransomware

SIGMA-016CRITICALexperimental

Mass File Encryption

Detects rapid file modifications indicative of ransomware encryption

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.