Sigma Rules

Sigma rules are signatures to detect threats. It is YAML format.

Example

"example.yml"

title: Example Threats
id: 0506a799-698b-43b4-85a1-ac4c84c720e9
status: experimental
description: This is an example rule.
author: John
date: 2023/01/14
modified: 
references:
    - https://example.com/example-threats
logsource:
    product: windows
    service: sysmon
detection:
    selection:
        EventID: 1
        ParentImage|endswith:
            - 'chrome.exe'
        Image|endswith:
            - 'mshta.exe'
        CommandLine|contains:
            - '\mshta.exe'
            - '-f'
            - ' -e '
        Hashes:
            - '31B87C94B9AFB492B845CEA2360A4B35'
    selection2:
        EventID: 2
    condition: selection OR selection2
fields:
falsepositives:
    - Unknown
level: medium
tags: # associated from MITRE ATT&CK
    - attack.credential access # MITRE Tactic
    - attack.t1110 # MITRE Technique