Skip to content

Custom Sigma detection rules for SIEM platforms. 12 rules across DNS, HTTP, Authentication, Lateral Movement, and Exfiltration categories.

License

Notifications You must be signed in to change notification settings

Pharns/detection-rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Detection Rules

Sigma Rules MITRE ATT&CK License: MIT

Custom Sigma detection rules developed and tuned in a homelab environment running Security Onion, Wazuh, and TheHive/Cortex.

Overview

Category Rules Focus Areas MITRE ATT&CK
DNS 3 Tunneling, DGA, suspicious TLDs T1071.004
HTTP 3 Beaconing, C2 callbacks, user-agents T1071.001
Authentication 2 Brute force, credential stuffing T1110
Lateral Movement 2 SMB, PsExec, WMI abuse T1021, T1047
Exfiltration 2 Large transfers, encrypted channels T1048

Total: 12 detection rules

False Positive Optimization

These rules were tuned over a 3-month lab period to reduce false positives:

Detection Initial FP After Tuning Method
DNS tunneling ~35% ~12% CDN allowlisting, entropy threshold
HTTP beaconing ~40% ~18% Time-window correlation, UA filtering
Auth anomalies ~25% ~8% Baseline normal hours per user group
Lateral movement ~30% ~15% Admin workstation exclusions

Average FP reduction: ~20%

Lab Environment

Rules were developed and tested against:

  • SIEM: Security Onion 2.4.x (Suricata, Zeek, Elasticsearch)
  • Host-Based: Wazuh 4.x (endpoint logs, FIM)
  • Case Management: TheHive 5.x + Cortex 3.x
  • Threat Intel: MISP community feeds
  • Targets: Windows 11, Active Directory, Ubuntu/Docker, DVWA, Juice Shop

Usage

With Security Onion / Elasticsearch

# Clone the repo
git clone https://github.com/Pharns/detection-rules.git

# Convert Sigma to Elasticsearch query
sigma convert -t elasticsearch rules/dns/dns_tunneling_entropy.yml

With Splunk

sigma convert -t splunk rules/dns/dns_tunneling_entropy.yml

With Microsoft Sentinel

sigma convert -t azure-monitor rules/dns/dns_tunneling_entropy.yml

Rule Structure

Each rule follows the Sigma specification:

title: Descriptive title
status: experimental | test | stable
description: What the rule detects and why
author: Pharns Genece
date: YYYY/MM/DD
references:
  - https://attack.mitre.org/techniques/TXXXX/
logsource:
  product: zeek | windows | ...
  service: dns | security | ...
detection:
  selection:
    field|modifier: value
  condition: selection
falsepositives:
  - Known benign scenarios
level: low | medium | high | critical
tags:
  - attack.tactic
  - attack.tXXXX

Directory Structure

detection-rules/
├── README.md
├── LICENSE
├── rules/
│   ├── dns/
│   │   ├── dns_tunneling_entropy.yml
│   │   ├── dns_dga_detection.yml
│   │   └── dns_suspicious_tld.yml
│   ├── http/
│   │   ├── http_beaconing_pattern.yml
│   │   ├── http_c2_callback.yml
│   │   └── http_suspicious_user_agent.yml
│   ├── authentication/
│   │   ├── auth_brute_force.yml
│   │   └── auth_anomalous_login_time.yml
│   ├── lateral-movement/
│   │   ├── lateral_smb_enumeration.yml
│   │   └── lateral_psexec_wmi.yml
│   └── exfiltration/
│       ├── exfil_large_outbound.yml
│       └── exfil_encrypted_channel.yml
└── .github/
    └── workflows/
        └── validate.yml

Contributing

Contributions welcome. Please:

  1. Follow the Sigma specification
  2. Include MITRE ATT&CK mapping
  3. Document false positive scenarios
  4. Test in a lab environment before submitting

Related Projects

Author

Pharns Genece GRC Engineer | Detection Engineering | Cloud Security

License

MIT License - See LICENSE for details.

About

Custom Sigma detection rules for SIEM platforms. 12 rules across DNS, HTTP, Authentication, Lateral Movement, and Exfiltration categories.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •