Learn the SIGMA rule format - the universal language for detection rules that works across any SIEM.
SIGMA is an open standard for writing detection rules in a vendor-agnostic format. Think of it as "YARA for logs" - one rule format that can be converted to any SIEM.
Before SIGMA, detection rules were written in proprietary formats:
This created problems:
SIGMA solves this with a universal format.
Every SIGMA rule has the same basic structure:
title: Suspicious PowerShell Download
status: experimental
description: Detects PowerShell downloading files from the internet
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'Invoke-WebRequest'
- 'wget'
- 'curl'
- 'DownloadFile'
Image|endswith: '\powershell.exe'
condition: selection
level: medium
tags:
- attack.execution
- attack.t1059.001
Explain what the rule detects and why it matters.
Defines what logs this rule applies to:
The actual detection logic:
SIGMA supports modifiers to match patterns:
|contains: Field contains the value|endswith: Field ends with the value|startswith: Field starts with the value|re: Regular expression matchSeverity of the detection:
Reference to MITRE ATT&CK and other frameworks.
The power of SIGMA is conversion. The sigma-cli tool converts rules to:
sigma convert -t splunk -p sysmon rule.yml