Files
blue-team-tools/README.md
T

55 lines
2.2 KiB
Markdown
Raw Normal View History

2016-12-24 11:56:10 +01:00
![sigma_logo](./images/Sigma_0.3.png)
2016-12-26 02:23:34 +01:00
# Sigma
2017-02-06 20:03:57 +01:00
Generic Signature Format for SIEM Systems
2016-12-26 02:23:34 +01:00
# What is Sigma?
2017-02-07 00:24:10 +01:00
Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
2016-12-26 11:14:15 +01:00
2016-12-26 02:23:34 +01:00
![sigma_description](./images/Sigma-description.png)
2017-02-07 00:24:10 +01:00
This repository contains:
* Sigma rule specification in the [Wiki](https://github.com/Neo23x0/sigma/wiki/Specification)
* Open repository for sigma signatures in the ```./rules```subfolder
* Collection of converters that generate searches/queries for different SIEM systems [Pending]
2017-02-07 00:24:37 +01:00
# Slides
2017-02-06 20:03:57 +01:00
See the first slide deck that I prepared for a private conference in mid January 2017.
[Sigma - Make Security Monitoring Great Again](https://www.slideshare.net/secret/gvgxeXoKblXRcA)
2017-02-08 12:41:32 +01:00
2017-01-07 22:39:06 +01:00
# Specification
2017-02-07 00:24:10 +01:00
The specifications can be found in the [Wiki](https://github.com/Neo23x0/sigma/wiki/Specification).
2017-02-06 20:03:57 +01:00
2017-02-07 00:24:10 +01:00
The current specification can be seen as a proposal. Feedback is requested.
2017-02-06 20:03:57 +01:00
2017-02-12 17:10:48 +01:00
# Examples
Windows 'Security' Eventlog: Access to LSASS Process with Certain Access Mask / Object Type (experimental)
![sigma_rule example2](./images/Sigma_rule_example2.png)
Sysmon: Remote Thread Creation in LSASS Process
![sigma_rule example1](./images/Sigma_rule_example1.png)
Web Server Access Logs: Web Shell Detection
![sigma_rule example3](./images/Sigma_rule_example3.png)
Sysmon: Web Shell Detection
![sigma_rule example4](./images/Sigma_rule_example4.png)
Windows 'Security' Eventlog: Suspicious Number of Failed Logons from a Single Source Workstation
![sigma_rule example5](./images/Sigma_rule_example5.png)
2017-02-07 00:24:10 +01:00
# Next Steps
2017-01-07 22:39:06 +01:00
2017-02-07 00:24:10 +01:00
* Creation of a reasonable set of sample rules
* Release of the first rule converters for Elastic Search and Splunk
* Integration of feedback into the rule specifications
* Collecting rule input from fellow researchers and analysts
2017-02-12 17:10:48 +01:00
* Attempts to convince others to use the rule format in their reports, threat feeds, blog posts, threat sharing platforms