Learn by Directing AI
All materials

sigma-rule-starter.yml

ymlsigma-rule-starter.yml
# Sigma Rule Starter Template
# Fill in the detection section with your specific detection logic.
# The structure is provided -- the detection pattern is yours to write.

title: [Rule title -- describe what this rule detects]
id: [Generate a UUID for this rule]
status: test
description: |
  [Describe what attack or activity this rule detects,
  what log source it works against, and what conditions trigger it.]

# Log source tells Sigma where to look for the data
logsource:
  category: webserver
  # product: [specific product if needed, e.g., nginx, apache]
  # service: [specific service if needed]

# Detection defines what patterns to match
detection:
  selection:
    # Field names must match your actual log labels in Loki.
    # Check Grafana > Explore > Loki > your log stream labels
    # before writing field names here.
    #
    # Example fields (replace with your actual label names):
    # fieldname: 'pattern to match'
    # fieldname|contains: 'partial match'
    # fieldname|re: 'regex pattern'
    pass: placeholder
  condition: selection

# Severity level
level: medium

# Tags for categorization (ATT&CK technique IDs)
tags:
  # - attack.initial_access
  # - attack.t1190