README Update Specs 1
This commit is contained in:
@@ -5,9 +5,136 @@ Generic Signatures for SIEM Systems
|
||||
|
||||
# What is Sigma?
|
||||
|
||||
- Generic signature format to describe relevant events in log files
|
||||
- Generic signature format to describe relevant events in log files
|
||||
- Open repository for sigma signatures
|
||||
- Set of converters that generate searches/queries for different SIEM systems
|
||||
|
||||

|
||||
|
||||
# Specification
|
||||
|
||||
The rules consist of a few required sections and several optional ones.
|
||||
|
||||
```
|
||||
title
|
||||
description [optional]
|
||||
detection
|
||||
{search-identifier} [optional]
|
||||
{string-list} [optional]
|
||||
{field: value} [optional]
|
||||
...
|
||||
timeframe [optional]
|
||||
condition
|
||||
falsepositives [optional]
|
||||
level [optional]
|
||||
```
|
||||
|
||||
## Title
|
||||
|
||||
A brief title for the rule that should contain what the rules is supposed to detect (max. 256 characters)
|
||||
|
||||
## Description
|
||||
|
||||
A short description of the rule and the malicious activity that can be detected (max. 65,535 characters)
|
||||
|
||||
## Detection
|
||||
|
||||
A set of search-identifiers that represent searches on log data
|
||||
|
||||
## Search-Identifier
|
||||
|
||||
A definition that can consist of two different data structures - lists and maps.
|
||||
|
||||
### Lists
|
||||
|
||||
The lists contain strings that are applied to the full log message and are logically linked with an 'OR'y.
|
||||
|
||||
Example:
|
||||
|
||||
'''
|
||||
detection:
|
||||
keywords:
|
||||
- EVILSERVICE
|
||||
- svchost.exe -n evil
|
||||
'''
|
||||
|
||||
Is combined in the resulting search statement like:
|
||||
|
||||
'''
|
||||
EvilService OR "svchost.exe -n evil"
|
||||
'''
|
||||
|
||||
### Maps
|
||||
|
||||
Maps (or dictionaries) consist of key/value pairs, in which the key is a field in the log data and the value a string or integer value. Lists of maps are joined with a logical 'OR'. All elements of a map are joined with a logical 'AND'.
|
||||
|
||||
Examples:
|
||||
|
||||
'''
|
||||
detection:
|
||||
selection:
|
||||
- EventLog: Security
|
||||
EventID:
|
||||
- 517
|
||||
- 1102
|
||||
condition: selection
|
||||
'''
|
||||
|
||||
Splunk Search:
|
||||
|
||||
'''
|
||||
EventLog=Security ( EventID=517 OR EventID=1102 )
|
||||
'''
|
||||
|
||||
### TimeFrame
|
||||
|
||||
A relative time frame definition using the typical abbreviations for day, hour, minute, second.
|
||||
|
||||
Examples:
|
||||
|
||||
'''
|
||||
15s
|
||||
30m
|
||||
12h
|
||||
7d
|
||||
3M
|
||||
'''
|
||||
|
||||
Note: The time frame is often a manual setting that has to be defined within the SIEM system and is not part of the generated query.
|
||||
|
||||
### Condition
|
||||
|
||||
|
||||
### FalsePositives
|
||||
|
||||
A list of known false positives that may occur.
|
||||
|
||||
### Level
|
||||
|
||||
A score between 0 and 100 to define the degree of likelyhood that generated events are actually incidents.
|
||||
|
||||
A rough guideline would be:
|
||||
|
||||
- 20 : Interesting event but less likely that it's actually an incident. A security analyst has to review the events and spot anomalies or suspcious indicators. Use this in a dashboard panel, maybe in form of a chart.
|
||||
- 40 : Interesting event, that shouldn't trigger too often. A security analyst has to review the events and spot anomalies or suspcious indicators. List the events in a dashboard panel for manual review.
|
||||
- 60 : Relevant event that should be reviewed manually on a more frequent basis. A security analyst has to review the events and spot anomalies or suspcious indicators. List the events in a dashboard panel for manual review.
|
||||
- 80 : Relevant event that should trigger an internal alert and has to be reviewed immediately.
|
||||
- 100 : Highly relevant event that triggers an internal alert and causes external notifications (eMail, SMS, ticket). Events are clear matches with no known false positives.
|
||||
|
||||
## Examples
|
||||
|
||||
```
|
||||
description: Eventlog Cleared
|
||||
comment: Some threat groups tend to delete the local 'Security'' Eventlog using certain utitlities
|
||||
detection:
|
||||
selection:
|
||||
- EventLog: Security
|
||||
EventID:
|
||||
- 517
|
||||
- 1102
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)
|
||||
- System provisioning (system reset before the golden image creation)
|
||||
level: 70
|
||||
```
|
||||
|
||||
Reference in New Issue
Block a user