EN
ENNA

Sigma

๐Ÿง  Threat Intelligence ยท Python/YAML

Sigma is a generic and open signature format for SIEM systems, analogous to what YARA is for files and Snort is for network traffic. Sigma rules describe log events in a YAML-based format that is independent of any specific SIEM product. Using the sigma-cli converter (pySigma), rules can be translated into native query languages for Splunk (SPL), Elasticsearch (Lucene/KQL), Microsoft Sentinel, QRadar, CrowdStrike, Carbon Black, Grep, and over 30 other backends. The Sigma rule repository contains thousands of community-contributed detection rules covering MITRE ATT&CK techniques, common malware behaviors, lateral movement, persistence mechanisms, and suspicious system activity. Security teams use Sigma to write detection logic once and deploy it across their entire detection infrastructure, regardless of which SIEM products they use. The format is maintained by the SigmaHQ project and has become the de facto standard for shareable detection rules.

10.3kstars
2.6kforks
114issues
Updated 6d ago

Installation

pip

$ pip install sigma-cli

from source

$ git clone https://github.com/SigmaHQ/sigma.git

Use Cases

  • Writing portable detection rules that work across multiple SIEM platforms
  • Converting community detection rules to Splunk SPL or Elasticsearch queries
  • Building a detection library aligned with MITRE ATT&CK techniques
  • Sharing detection logic between security teams using different SIEM products
  • Testing and validating detection coverage against known attack patterns

Tags

detection-rulessiemyamlsplunkelasticsearchmitre-attackidsloggingmonitoringsecuritysignaturessysmon

Alternatives & Comparisons

More in Threat Intelligence