Sigma is a standard rule format used by security analaysts and Security Information and Event Management (SIEM) systems.
Construct a SIGMA rule:
title: Suspicious File Drop in Users Temp Location
status: experimental
description: Detects suspicious activity where a file is dropped in the temp location
logsource:
category: process_creation
detection:
selection:
TargetFilename:
- '*\\AppData\\Local\\Temp\\svchost.exe'
condition: selection
level: high
falsepositives:
- Legitimate exe file drops in temp location
In this instance, the rule is designed to identify when the file svchost.exe is dropped in the Temp directory.