sigma-specification

SigmaHQ Rule Conventions

This document describes an additional set of rule conventions enforced by the SigmaHQ rule repository in order to ensure an easy to maintain rule base.

For the general Sigma rule specification please read see this

Summary

Structure

The rules consist of a few required sections and several optional ones.

title [required]
id [required]
related [optional]
   - id {rule-id}
      type {type-identifier}
status [required]
description [required]
references [required]
author [required]
date [required]
modified [optional]
tags [required]
logsource [required]
   category [optional]
   product [optional]
   service [optional]
   definition [optional]
   ...
detection
   {search-identifier} [optional]
      {string-list} [optional]
      {map-list} [optional]
      {field: value} [optional]
   ...
   condition
fields [optional]
falsepositives [required]
level [required]

Filenames

All rule filename must follow the convention described in the SigmaHQ Filename Convention file.

Indentation

The recommended indentation is 4 spaces.

Titles

All SigmaHQ rule titles must use title casing

Example:

title: Suspicious Office Child Process

Status

All newly created rules must start with a status of experimental

Description

description: |
    Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage.
    The process in field Process is the malicious program. A single execution can lead to hundreds of events.

References

Detection

Item Lists

Single item list must be expressed in the same line instead of multi-line.

Example of single list items:

detection:
    selection:
        Image|endswith: '\example.exe'

Example of multi item list:

detection:
    selection:
        Image|endswith:
            - '\example_1.exe'
            - '\example_2.exe'
            - '\example_3.exe'

Condition

False Positives

falsepositives:
    - During software X installation the process Y is known to behave similarly as Z 
    - Administrators or administrator scripts might sometimes generate similar activity

Also please note the following