Skip to content

About Sigma

You may have heard of Sigma rules before – especially around Security Operations Centres (SOCs), Threat Hunting teams, and more generally around the cyber security landscape.

While people often associate Sigma with the detection format, it's important to understand the wider ecosystem of standards, tools, and rule collections.

There are three main aspects or components that make up this ecosystem.

These three components work together to create a comprehensive ecosystem for SIEM detection that supports the creation, management, and sharing of detection rules across different platforms and use cases.

The Format

The "Sigma" format exists as a way to share detections of malicious or dangerous behaviour among security professionals.

It is built as an open-source standard so that a single Sigma detection rule can be used across the entire security landscape of SIEMs (Eg. Splunk, Azure Sentinel and more), logging platforms (Eg. greylog) and databases (Eg. MySQL).

“Sigma is for log files what Snort is for network traffic and YARA is for files.”

The Sigma rule format is flexible, easy to write, and applicable to any type of log file. The main purpose of this project is to provide a structured form in which detection engineers, security researchers or security analysts can describe their own detection methods and make them shareable with others.

yaml
title: AWS Root Credentials
description: Detects AWS root account usage
logsource:
    product: aws
    service: cloudtrail
detection:
    selection:
        userIdentity.type: Root
    filter:
        eventType: AwsServiceEvent
    condition: selection and not filter
falsepositives:
    - AWS Tasks That Require Root User Credentials
level: medium

Example: This Sigma rule looks for usage of AWS root credentials.

Learn more about Sigma rules

To learn more about Sigma rules and how to use them to detect within your SIEM, visit the "Sigma Rules" page.

The Tools

Built around the Sigma detection format are amazing tools to help you make the most of it.

The primary focus of the Sigma ecosystem is the converter – something that turns Sigma detection files into usable SIEM queries. In the past, this was completed by a tool called "sigmac".

In 2023, the ecosystem is moving to a new tool –> powered by pySigma, called sigma-cli.

You can jump straight in and convert to many popular existing SIEMs already.

Getting started!

Keen to start converting from Sigma format to your SIEM's queries? Visit the "Getting Started" page.

Supported SIEMs

SplunkElasticLogpointMicrosoft Advanced Threat ProtectionSumologicAzure Sentinel

To learn more about the supported targets (or "backends") that Sigma supports, visit the "Sigma Backends" page.

The Rules

Lastly, there exist many repositories that have collated Sigma detections to better help the community detect threat actors.

One of the most widely used rule collections is the SigmaHQ/sigma repository, hosted on GitHub, which contains a large and growing number of high-quality Sigma detection rules that security teams can immediately convert & deploy out to their SIEMs to start detecting malicious behaviour across their organisation.

In addition to the SigmaHQ/sigma rule collection, there are also several other repositories maintained by different individuals and organizations that contain Sigma rules. These repositories can cover a wide range of threat types and attack scenarios, and can be useful for organizations looking to expand their detection capabilities or stay up to date with emerging threats.

Why Sigma?

Here are some great reasons to start adopting Sigma within your security detection strategy.

  • Be technology-agnostic
    Sigma provides a way of managing detections without having to commit to one specific SIEM's query language. This means if you want to change SIEMs later on, or migrate detections over to another client using a different technology stack, you can effortlessly try those detections.
  • Start using thousands of existing detections
    Since it's inception, the Sigma community has already contributed over 15'000 rules and existing rule modifications to the Sigma repository. These are all free for you to use right away, and increasing your security detection coverage right away.
  • Bringing CI/CD to your detection workflow
    Because all Sigma rules are stored within .yml files, you can start using the communities'-made script to deploy out your detections straight from a GitHub, Gitlab, or any CI/CD pipeline, straight into your SIEM. This also provides version control over your detections, so you can deploy only when required, and see how your detection repositories change over time.

Design Philosophy

The Sigma standard was designed to support basic search queries, and only a few common correlations (Eg. sum / count), covering more tha 90% of the day-to-day needs of detection strategies. This trade off was made to ensure the ability to share detections across all sorts of security environments.

History

Released by Florian Roth in 2017, Sigma (The Generic Signature Format for SIEM Systems) has paved the way for platform-agnostic search. With Sigma, defenders can harness the community's power to react promptly to critical threats and new adversary trade-craft. You get a fixed-language specification for the generic rule format, a tool for converting Sigma rules into various query formats and a repository of over one thousand rules for several attack techniques.

Like YARA, or Snort Rules, Sigma is a tool for the open sharing and crowd-sourcing of threat intelligence, it focuses on SIEM instead of files or network traffic. What Snort is to network traffic, and YARA is to files, Sigma is to logs.

Most attacks on IT systems and networks manifest themselves in event logs stored in the SIEM systems or other log storage and analysis solutions. This makes SIEM a crucial tool to detect and alert against intruders. SIEM detection rule-sets existed in the vendor or platform-specific databases in the earlier days. The growing demand for up-to-date detections and analytics to be secure today requires sharing detection intelligence between different stakeholders and vendors. Sigma solves this challenge to make the queries and rule-sets platform-agnostic.

From https://fourcore.io/blogs/sigma-rules-open-source-threat-hunting-approach

Frequently Asked Questions

Where do I find Sigma rules?

The biggest collections of Sigma rules are held in the following repositories, but there are many more.

You'll also find Sigma rules attached to Virus Total signatures, as well as included in Threat Sharing Platforms like MISP.

Which SIEM / log management systems are supported?

Sigma is a generic signature format that can be converted manually or automatically into search expressions. For most target systems, it is an easy task to extend the list of backends and add a new one for your specific query language. Check the README of the project for a complete list of currently supported backends.

Why use YAML?

It is easy to read and write, flexible and provides all needed language elements. However it lacks a standardized schema language as XML provides it.

Isn't Sigma the same as OSSEC?

Sigma aims at being a generic signature format for all kinds of log data, whereas OSSEC covers host based detection very well in its own specific XML rule base. We could definitely convert the OSSEC rule base licensed under the GPL and provide those as rules in Sigma format so that the detections become available in any SIEM system.

Contributing

If you want to contribute to the project, you are more then welcome! There are numerous ways to help this project:

  • Provide Feedback
    Use Sigma and tell us what works, and what doesnt. This includes:
    • False Positives (New Issues)
      Detections that don't detect the behaviour it's intended to, or
    • True Negatives (New PRs)
      Detections that don't quite detect all the strategies intended.
    • Bugs in Tooling (New Issues)
      If you encounter any errors in sigma-cli, or any other supported tool, please feel free to lodge a fully detailed issue (including stack trace and expected behaviour).

  • Work on Open Issues
    The github issue tracker is a good place to start tackling some issues others raised to the project. It could be as easy as a review of the documentation.

Legacy Looking for sigmac?

If you're looking for the legacy tool sigmac and the surrounding ecosystem, please head over to legacy-sigmatools Github repository.. This legacy repo is no longer accepting new backends for SIEMs.

Specification

The entire Sigma specification, including outlines of each file format, is documented within the Sigma Specification repository. If you believe that there should be a change to the standard, you can submit an Feature Request, or a Pull Request to the Sigma specification repository below.

https://github.com/SigmaHQ/sigma-specification

Credits

The Sigma ecosystem is mainly developed by Florian Roth (https://github.com/Neo23x0/) and Thomas Patzke (https://github.com/thomaspatzke) with feedback from many fellow analysts and friends. Rules are our own or have been derived from blog posts, tweets or other public sources that are referenced in the rules.