This document describes an additional set of rule conventions enforced by the SigmaHQ rule repository in order to ensure an easy to maintain rule base.
For the general Sigma rule specification please read see this
The rules consist of a few required sections and several optional ones.
title [required]
id [required]
related [optional]
- id {rule-id}
type {type-identifier}
status [required]
description [required]
references [required]
author [required]
date [required]
modified [optional]
tags [required]
logsource [required]
category [optional]
product [optional]
service [optional]
definition [optional]
...
detection
{search-identifier} [optional]
{string-list} [optional]
{map-list} [optional]
{field: value} [optional]
...
condition
fields [optional]
falsepositives [required]
level [required]
All rule filename must follow the convention described in the SigmaHQ Filename Convention file.
The recommended indentation is 4
spaces.
All SigmaHQ rule titles must use title casing
Example:
title: Suspicious Office Child Process
All newly created rules must start with a status of experimental
Detects
|
to signify a multiline string. Example:description: |
Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage.
The process in field Process is the malicious program. A single execution can lead to hundreds of events.
Single item list must be expressed in the same line instead of multi-line.
Example of single list items:
detection:
selection:
Image|endswith: '\example.exe'
Example of multi item list:
detection:
selection:
Image|endswith:
- '\example_1.exe'
- '\example_2.exe'
- '\example_3.exe'
1 of selection_*
or 1 of selection_*
in order to make them more readable.filter_main_*
: For filters that are mandatory to the rule’s logic, or if the excluded behavior or software is present by default or very common.filter_optional_*
: For filters that are based on behaviors or software that aren’t part of the default installation of the OS or service being targeted.falsepositives:
- During software X installation the process Y is known to behave similarly as Z
- Administrators or administrator scripts might sometimes generate similar activity
Unknown
.Unlikely
.Also please note the following
None
, Pentest
, Penetration Test
, Red Team
, Etc, are not accepted as valid values.