We advocate and discuss SigmaHQ repository of detections frequently on Thursday Defensive, but we never go into too much detail. There are always lingering questions of what type of detections do we use? How do you tune those rules? What other tools use these rules? So as one of the detection engineers at Recon, I figured I would share some of the knowledge I’ve obtained over the last 6 years of dealing with SigmaHQ detections in my day-to-day operations.
This series of blog posts should cover the basics to get you started. What is SigmaHQ? How are detections written? How can detection engineering be integrated into your tools/soc/security team? And a few other fancy uses you can get out of this free and amazing repository of detections.
SigmaHQ is a GitHub repository where detection engineers, threat hunters, and defensive security practitioners collaborate on detection rules. This open-source approach to detection engineering has allowed for greater collaboration within the community and much faster response to finding malicious activity. Having a singular format used by the community allows for easy integration/query building for other platforms like Splunk, Elasticsearch, Microsoft365 Defender, and CarbonBlack to name a few. If you are interested in testing the conversion tool or doing a deeper dive later, you can visit their readme, which provides wonderful documentation and tools to get started with Sigma.
Now that we know what Sigma is, who is out there using this tool? Well, the answer is many large companies use these detections to bolster the effectiveness of in-house tools, public tools, and SIEM platforms. Some commonly used tools include: MISP, JoeSandbox, Lima Charlie, and IBM (now Palo Alto) QRadar. VirusTotal is a perfect example of a database where many users may have uploaded a file or hash and may have scrolled right past the open-source detections.
Now you understand what Sigma is and who uses it. That leaves us with why you should care? While there is a laundry list of reasons, I will list some of the top ones for Recon InfoSec.
Alright, you have sold me on using Sigma. It is the best thing since 50 cent taco Tuesday. So how do I go about building one of these rules?
Writing a Sigma detection rule involves a structured approach using YAML syntax. Each rule is made up of several key components that define the behavior or activity you want to detect in your SIEM system. Here's a breakdown of a rule we use and its main components:
false positives: - Administrator activity
level: medium
low, medium, high
).Yaml
Tools like pySigma and sigma-cli can be used to convert these YAML-based Sigma rules into the native query language of your SIEM system, making deployment straightforward. (GitHub) (Explore Sigma).
While I can go on a tangent about rule creation, the example above is a general, solid rule. Stay tuned for more content and blogs to come in the future. In part 2, we’ll cover how to write a detection from scratch, tuning these rules, and where to implement/use them.
SigmaHQ allows you to be versatile against most platforms that aggregate log data. Recon has become incredibly adept at taking existing rules that have been shared with the community along with creating our own to leverage them against log data to find bad actors. We hope by publishing this information, we can contribute to elevating the art of security operations.
If you have any questions or would like to discuss further, please contact info@reconinfosec.com