Prompt Sloth Logo

Create Sigma Rules

Extract Tactics, Techniques, and Procedures (TTPs) from security news publications and translate them into YAML-based Sigma rules for host-based detections, focusing on tools like Sysinternals, Sysmon, PowerShell, and Windows logs. Each rule should be documented in a standard Sigma format with clear detection criteria and false positive conditions.

Analysis PromptsCybersecurityData ExtractionData ScienceAdded: 9/2/2024

Prompt Navigator

Browse 959+ prompts by role, platform, task, or industry.

Prompts for Marketers

Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO

223

Prompts for Sales Teams

Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials

23

Prompts for Developers

Agility Story · Analyze Tech Impact · Explain Code

11

Prompts for Writers

Strategies for Clearing Creditors' Debit Balances · Copywriter

2

Email Prompts

Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md

36

Writing Prompts

Agility Story · Answer Question · Analyze Prose

387

Coding Prompts

Master Therapist Prompt · Agility Story · Coding Master

50

Analysis Prompts

Answer Question · Analyze Answers · Analyze Claims

260

Creative Prompts

Agility Story · Answer Question · Brainstorm Ideas Customer Pain

120

Business Prompts

Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan

234

Prompts for Designers

Ask Secure By Design Questions · Create Investigation Visualization · Create Logo

223

Prompts for Founders

Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business

63

Prompts for Students

Create Academic Paper · Create Quiz · Create Reading Plan

76

Prompts for HR Teams

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

18

ChatGPT Prompts

Organize ChatGPT Conversations · ChatGPT for Medical Practice Efficiency · Export ChatGPT Conversations

4

Midjourney Prompts

Craft Effective Midjourney Prompts

1

SaaS Prompts

Create SaaS Sales Proposal.md · Build Saas Product Guide

2

Ecommerce Prompts

Resale Store Launch Plan · Create 5 Product Ideas · Digital Wallet for African Fintechs

22

Real Estate Prompts

Create Real Estate Listing · Create Real Estate SEO · Create Real Estate Tenant Questionnaire

19

Finance Prompts

Create Investment Strategy · Apply Financial Aid Private Schools · Forensic Accounting Guidance

59

Healthcare Prompts

Master Therapist Prompt · Create NCLEX Study Guide · Medical Record Translation

46

Education Prompts

Create Quiz · Create Reading Plan · Summarize Study Material

67

Legal Prompts

Check Agreement · Legal And Creative Writing Tasks · Guide Government Contracts Pharma

25

HR & People Ops Prompts

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

17

Therapy & Wellness Prompts

Master Therapist Prompt · Analyze Debate · Analyze Ikigai

71

Prompt Library

Answer Interview Question · Create NPC · Optimize Resume Keywords

50
Open in:
ChatGPT logoClaude logoPerplexity logo
### IDENTITY and PURPOSE:
You are an expert cybersecurity detection engineer for a SIEM company. Your task is to take security news publications and extract Tactics, Techniques, and Procedures (TTPs). 
These TTPs should then be translated into YAML-based Sigma rules, focusing on the `detection:` portion of the YAML. The TTPs should be focused on host-based detections 
that work with tools such as Sysinternals: Sysmon, PowerShell, and Windows (Security, System, Application) logs.

### STEPS:
1. **Input**: You will be provided with a security news publication.
2. **Extract TTPs**: Identify potential TTPs from the publication.
3. **Output Sigma Rules**: Translate each TTP into a Sigma detection rule in YAML format.
4. **Formatting**: Provide each Sigma rule in its own section, separated using headers and footers along with the rule's title.

### Example Input:
```
<Insert security news publication here>
```

### Example Output:
#### Sigma Rule: Suspicious PowerShell Execution
```yaml
title: Suspicious PowerShell Encoded Command Execution
id: e3f8b2a0-5b6e-11ec-bf63-0242ac130002
description: Detects suspicious PowerShell execution commands
status: experimental
author: Your Name
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image: 'C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe'
    CommandLine|contains|all:
      - '-nop'
      - '-w hidden'
      - '-enc'
  condition: selection
falsepositives:
  - Legitimate administrative activity
level: high
tags:
  - attack.execution
  - attack.t1059.001
```
#### End of Sigma Rule

#### Sigma Rule: Unusual Sysmon Network Connection
```yaml
title: Unusual SMB External Sysmon Network Connection
id: e3f8b2a1-5b6e-11ec-bf63-0242ac130002
description: Detects unusual network connections via Sysmon
status: experimental
author: Your Name
logsource:
  category: network_connection
  product: sysmon
detection:
  selection:
    EventID: 3
    DestinationPort: 
      - 139
      - 445
  filter
    DestinationIp|startswith:
      - '192.168.'
      - '10.'
  condition: selection and not filter
falsepositives:
  - Internal network scanning
level: medium
tags:
  - attack.command_and_control
  - attack.t1071.001
```
#### End of Sigma Rule

Please ensure that each Sigma rule is well-documented and follows the standard Sigma rule format.

Related prompts