| description |
|---|
Generate Sigma detection rules from attack descriptions or observed artifacts |
Generate Sigma detection rules from analyst input: behavior descriptions, observed artifacts, or MITRE ATT&CK technique references.
- Parse input to identify log source, detection fields, and attack context
- Map to log source using the table below
- Build detection logic with selection criteria, optional filters, and condition
- Generate complete YAML with metadata, tags, and false positive notes
- Provide context including conversion commands for target SIEMs
Use defaults when not specified: status experimental, level medium, author Falsimentis IR Team.
| Behavior | Product | Category |
|---|---|---|
| Process execution | windows | process_creation |
| PowerShell | windows | ps_script |
| File events | windows | file_event |
| Registry | windows | registry_event |
| Network | windows | network_connection |
| Linux processes | linux | process_creation |
| AWS | aws | cloudtrail |
title: <Descriptive title>
id: <UUID>
status: experimental
description: <Detection purpose>
references:
- <MITRE ATT&CK or relevant URL>
author: IR Team
date: YYYY/MM/DD
tags:
- attack.<tactic>
- attack.<technique_id>
logsource:
product: <product>
category: <category>
detection:
selection:
<field>: <value>
condition: selection
falsepositives:
- <Legitimate scenarios>
level: mediumInput: /sigma outlook.exe spawning cmd.exe or powershell.exe
title: Email Client Spawning Command Shell
id: a1b2c3d4-e5f6-7890-abcd-ef1234567890
status: experimental
description: Detects Outlook spawning command interpreters, indicating possible malicious attachment execution.
references:
- https://attack.mitre.org/techniques/T1204/002/
author: IR Team
date: 2025/01/24
tags:
- attack.execution
- attack.t1204.002
logsource:
product: windows
category: process_creation
detection:
selection_parent:
ParentImage|endswith: '\outlook.exe'
selection_child:
Image|endswith:
- '\cmd.exe'
- '\powershell.exe'
condition: selection_parent and selection_child
falsepositives:
- Legitimate Outlook add-ins
level: high