Sigma Threat Detection Skill
Hunt threats and analyze security events using Sigma detection rules. Converts Sigma rules to SIEM queries (Splunk, Elastic, Sentinel), creates custom detection rules, and performs log-based threat analysis for SOC teams.
Description
This skill enables threat hunting and security event analysis using the Sigma detection rule format. It can convert Sigma rules to platform-specific queries (Splunk SPL, Elastic KQL, Microsoft Sentinel KQL), create custom detection rules for new threats, and analyze log data against known attack patterns. Built for SOC analysts and security engineers.
Instructions
- Rule Conversion: Convert Sigma YAML rules to target SIEM platform query syntax
- Rule Creation: Write new Sigma rules based on threat descriptions or IOC patterns
- Log Analysis: Evaluate log entries against Sigma rules to identify matches
- Coverage Mapping: Map detection rules to MITRE ATT&CK techniques
Rules
- Always validate Sigma YAML syntax before conversion
- Include the MITRE ATT&CK technique ID in every rule's
tagsfield - Set appropriate
level(informational, low, medium, high, critical) based on true positive likelihood - Use
selectionandconditionfields properly -- avoid overly broad detection patterns - Include
falsepositivessection to help analysts triage alerts - Test rules against sample log data when provided
- Reference the SigmaHQ rule repository for existing coverage before writing new rules
Sigma Rule Template
title: Suspicious PowerShell Download Cradle id: 3b6ab547-0998-4b4e-9f54-c0623e3e6f01 status: stable description: | Detects PowerShell commands commonly used to download and execute payloads from remote servers (download cradle patterns). author: Security Team date: 2025/03/01 modified: 2025/03/15 references: - https://attack.mitre.org/techniques/T1059/001/ tags: - attack.execution - attack.t1059.001 - attack.t1105 logsource: category: process_creation product: windows detection: selection_cmdlet: CommandLine|contains: - 'Invoke-WebRequest' - 'Invoke-RestMethod' - 'wget ' - 'curl ' - 'Net.WebClient' - 'Start-BitsTransfer' selection_execute: CommandLine|contains: - 'IEX' - 'Invoke-Expression' - '-enc ' - '-EncodedCommand' - 'FromBase64String' condition: selection_cmdlet and selection_execute falsepositives: - Legitimate software installation scripts - System administration automation level: high
SIEM Conversion Examples
Splunk SPL
index=windows sourcetype=WinEventLog:Security EventCode=4688 | where match(CommandLine, "(?i)(Invoke-WebRequest|Net\.WebClient|wget|curl)") | where match(CommandLine, "(?i)(IEX|Invoke-Expression|-enc |FromBase64String)") | table _time, Computer, User, CommandLine, ParentCommandLine
Elastic KQL
process.command_line: (*Invoke-WebRequest* OR *Net.WebClient* OR *wget* OR *curl*) AND process.command_line: (*IEX* OR *Invoke-Expression* OR *-enc* OR *FromBase64String*)
Microsoft Sentinel KQL
SecurityEvent | where EventID == 4688 | where CommandLine has_any ("Invoke-WebRequest", "Net.WebClient", "wget", "curl") | where CommandLine has_any ("IEX", "Invoke-Expression", "-enc", "FromBase64String") | project TimeGenerated, Computer, Account, CommandLine, ParentProcessName
MITRE ATT&CK Coverage Report
| Technique | ID | Detection Rules | Coverage | |-----------|----|----------------|----------| | PowerShell | T1059.001 | 12 | HIGH | | Scheduled Task | T1053.005 | 8 | MEDIUM | | Registry Run Keys | T1547.001 | 6 | MEDIUM | | Pass the Hash | T1550.002 | 3 | LOW | | DCSync | T1003.006 | 2 | LOW |
Examples
"Convert this Sigma rule to Splunk SPL format"
"Create a detection rule for lateral movement via WMI"
"Map our current Sigma rules to MITRE ATT&CK and show gaps"
"Analyze these Windows event logs for T1059 execution techniques"
Reviews
No reviews yet. Be the first to review this template!
Similar Templates
Full-Stack Code Reviewer
Comprehensive code review skill that checks for security vulnerabilities, performance issues, accessibility, and best practices across frontend and backend code.
Test Suite Generator
Generates comprehensive test suites with unit tests, integration tests, and edge cases. Supports Jest, Vitest, Pytest, and Go testing.
Pro Architecture Workspace
Battle-tested skill for architectural, decision, making, framework. Includes structured workflows, validation checks, and reusable patterns for development.