Skip to content

Open-source Sigma detection rules for SOC teams, covering active CVEs, real-world attacks, Fortinet, Windows, cloud threats, incident response and detection engineering.

License

Notifications You must be signed in to change notification settings

Hatchepsoute/sigma-rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

200 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Sigma SOC SOAR MITRE License Fortinet Microsoft Security

🛡️ Sigma Detection Framework for SOC Operations

👉🏾 French version available here

SOC Framework

Sigma Rules – SOC Detection Engineering Framework

This repository provides a production-oriented SOC Detection Engineering framework based on Sigma rules, CTI-driven analysis, and real-world attack campaigns.

This framework is designed to help SOC teams:

  • Detect exploitation attempts early
  • Reduce false positives
  • Maintain detection coverage even as attacker tooling evolves

Detection Philosophy

This project avoids static IoCs (hashes, filenames, IPs) and instead relies on behavior-based detection using attack patterns and invariants, validated in real SOC environments. Detection logic follows a layered, SOC-tested, and resilient approach:

  • BROAD rules for visibility and threat hunting
  • STRICT rules for confirmation and high-confidence alerting
  • Behavioral detections resilient to payload renaming
  • Network invariants for edge devices and appliances without EDR
  • Correlation logic to confirm and contextualize incidents

Each CVE detection pack is documented in its own directory and includes Sigma rules, decision tables, and SOC playbooks.

Detection engineering should not break when attackers rename files.


Campaign-Based Detection Packs

Beyond CVE-centric detections, this repository includes campaign-oriented detection packs based on real-world threat actor activity.

These packs are built from incident analysis and CTI research, not theoretical attack models.

They provide:

  • Full attack lifecycle coverage
  • Detection of renamed or evolving payloads (v2 / v3)
  • Network and behavioral invariants
  • SOC-ready decision tables and response playbooks

Examples

  • FortiWeb exploitation with Sliver C2 and proxy masquerading (campaign-based pack)
  • CVE-focused detection packs designed for SOC anticipation and post-disclosure exploitation monitoring:
    • Windows Kernel / Graphics / Userland vulnerabilities (Patch Tuesday)
    • Microsoft Office vulnerabilities
    • WinRAR vulnerabilities
    • Azure Monitor Agent vulnerabilities
    • Microsoft Copilot vulnerabilities

CVE packs help SOC teams anticipate weaponization phases using BROAD and STRICT rules combined with SOC-ready artifacts (decision tables, playbooks, diagrams).


SOC & SOAR Integration

Rules are designed for production SOC environments and can be integrated with:

  • SIEM platforms (Elastic, OpenSearch, Splunk, Sentinel, QRadar)
  • SOAR platforms such as TheHive, Cortex, and Shuffle

Repository Structure

Each detection pack follows a consistent and reusable structure:

  • Sigma rules
  • Decision tables
  • Playbooks
  • Diagrams

How to use this repository

  • Browse CVE or campaign folders
  • Start with BROAD rules for visibility and hunting
  • Escalate to STRICT rules for confirmation
  • Use decision tables and playbooks for SOC response and triage

Who is this repo for?

SOC analysts • Detection engineers • Blue teams • MSSP


License

This project is licensed under the Apache License, Version 2.0.

You are free to use, modify, and distribute these Sigma rules, including for commercial purposes, provided that proper attribution is given.


⭐ If you use these rules in production or labs, please star the repo
🔁 Feedback & contributions are welcome


Author: Adama ASSIONGBON – SOC & CTI Consultant
LinkedIn Profile