Post 18 - Searching with Sigma

19 Dec 2022

Task 23, Day 18, Sigma Lumberjack Lenny Learns New Rules

Threat detection involves proactively prusuing and analysing abnormal activity within an ecosystem to identify malicious signs of compromise or intrusion within a network.

IOCs - Indicators of compromise.

Attack Scenario

Logs pointed to a likely attack and can be mapped to the UKC. Use Sigma application to chop logs. Sigma is an open-source generic signature language for describing log events in a structured format. Format uses YAML, markup language with a designed syntax allowing for quick sharing of detection methods by security analysts. Common factors of note about YAML files:

Sigma rules are vendor-agnostic, so the rules can be converted to a format that fits the preferred SIEM.

Sigma Rule Syntax

Rules guided by a given order of required/optional fields and values that create the structure for mapping needed queries.

Tools include Sigmac (deprecated), pySigma, and Uncoder.io.

The Task

Use THM Sigma tool to generate rules/queries and get flags and details about each step of attack.

Flags gotten, fun had.