Skip to content

Detection Rules Management - Coming soon

Rules Catalog:

Security profile MITRE ATT&CK

The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters and defenders to better classify attacks and assess an organization's risk. Every time you enable a rule, it appears on the Framework in blue in one or many cells. Each cell represents an attack technique. The cells are clickable and enable you to see or disable the rules activated in each one. You can see how many rules are enabled in a cell by hovering over it. The color changes depending on the number of rules activated in one cell. The blue gets darker when more rules are enabled and a white cell means that no rule is activated in it.


Rules attributes


Two types of rules are displayed on the Rules Catalog.

Available rules: All custom rules created by you in addition to the available rules in the Rules Catalog.

Verified rules: Rules created by SEKOIA.IO’s analysts, related to the CTI and available in the Rules Catalog.

Effort level:

The effort level is increasing from Elementary to Master according to two criteria:

  • Effort needed to enable a rule.
  • Risk of false positives.

Master rules are generic and raise a lot of alerts, which need to be contextualized in a more refined way. Whereas elementary rules require less effort and raise relatively fewer alerts. The blue square represents a clickable counter of activated rules, it is therefore possible to use the filters related to the effort level by clicking on one or more of them.


The rules are related to different elements according to offensive and defensive capabilities. They can be related to threats, attacks and data sources. Each element is associated to a filter that can be used to display the rules related to the selected element.

SEKOIA.IO Rules_Catalog_Attributes

Manage existing rules


There are different filters linked to all rules attributes above. They can be used either separately or in addition to other filters and allow you to Enable or Disable all rules displayed simultaneously.

Rules details:

On top of the details of a rule, you can see the name, when it was released and last updated. There are information about the effort level attributed to the rule, the severity, tags that ease search, related threats. It also explains the followed strategy and gives information about false positives, STIX patterning and data sources. To edit an existing rule, click on the gear icon to select entities and assets, or to add a filter alert.

SEKOIA.IO Rules_Catalog_Existing

Add a custom rule

In addition to the rules available in the catalog provided by SEKOIA.IO, you can add your own rules.

  • General definition of the rule: The rule name is mandatory during the creation, it will be used to name the corresponding raised alerts by default. You can add an optional description bellow. Select the effort level required and the threats detected with this rule if any, by selecting it on from the MITRE ATT&CK or by using the search bar through key words or drop-down list.

  • Entities & Assets: You can select entities and assets manually or use all of them as a basis to filter the analyzed events. Detection rules can be applied to all events, whatever the entity to which they are attached or the assets to which they can be linked, or applied only to some of them. If you choose 'Using all entities' and 'Using all assets', rules will be applied to all events even if new entites or new assets were added since last rule modification. For rules for which some entities or some assets were selected, if new entities or new assets are created, detection will not occur on corresponding events without rule modification.

  • Detection patterns: The signature part corresponds to the rule itself, the detection pattern applied to events. There are two type of rules: CTI or correlation.

For CTI rules, you just have to select the source of the indicators: SEKOIA Intelligence Feed is an IOCs feed managed by SEKOIA's Purple Team (indicators present in the SEKOIA.IO Intelligence Center).

For correlation rules, the language used is STIX Patterning. More details about this langage are given below.

  • Security alerts: In the Alert properties part, you should indicate the category and type of the alerts raised by the rule and the severity of the rule, which is used to calculate the urgency of the corresponding raised alerts in association with assets criticality for events matching assets.

SEKOIA.IO Rules_Catalog_Custom


Modification of rules parameters will be applied for new alerts, raised after the compilation of the rule.

STIX Patterning

Correlation rules are written using STIX Patterning.

In order to enhance detection of possibly malicious activity on networks and endpoints, a standard language is needed to describe what to look for in a cyber environment. STIX, abbreviation for Structured Threat Information eXpression, is a standardized language developed by MITRE and OASIS Cyber Threat Intelligence (CTI) Technical Committee to describe information about cyber-threats. It has been adopted as an international standard by various communities and organizations sharing information.

STIX Patterns are composed of multiple building blocks, ranging from simple key-value comparisons to more complex, context-sensitive expressions. The most fundamental building block is the Comparison Expression, which is a comparison between a single property of a Cyber Observable Object and a given constant using a Comparison Operator. As a simple example, one might use the following Comparison Expression (contained within an Observation Expression) to match against an IPv4 address:

[ipv4-addr:value = '']
Observation Expressions are contained in square brackets [ ... ] and may consist of one or more Comparison Expressions joined by Boolean Operators. Observation Expressions may be followed by one or more Qualifiers, which allow for the expression of further restrictions on the set of data matching the pattern. The final, highest level building block of STIX Patterning combines two or more Object Expressions via Observation Operators, yielding a STIX Pattern capable of matching across multiple STIX Observed Data SDOs.

STIX Patterning


Currently, we set a limitation and only rules matching with single Observed Data, and so using only one Observation Expression contained in square brackets, are available for our customers.


When matching an Observation against an Observation Expression, all Comparison Expressions contained within the Observation Expression MUST start matching against the same SCO in the Observation. That is, when resolving object paths of each Comparison Expression, the <object-type>:<property_name> MUST start from the same SCO. Different SCOs may ultimately be used in matching, but they MUST be referenced from the same, single SCO.

An Observation Expression MAY contain Comparison Expressions with Object Paths that start with different object types, but such Comparison Expressions MUST be joined by OR. The Comparison Expressions of an Observation Expression that use AND MUST use the same base Object Path.


Regarding the use of regular expressions (MATCHES keyword) in STIX Patterning rules, it is necessary to escape the “\”. Thus, the STIX Patterning rule to identify countries other than France, you will need to use the following rule:

[ipv4-addr:x_tags[*].name MATCHES '^country:(?!FR)\\w+']

For more information about STIX and STIX Patterning, please refers to the OASIS STIX Patterning specification.

How to Validate STIX Patterning Rule’s Syntax

SEKOIA.IO checks the syntax of submitted rules and reports errors to the “rules” interface.

In order to validate your rule’s syntax, you can also use an open source tool called stix2-patterns. This tool is part of the official tools developed by the OASIS Technical Committee.

Here’s an example on how to use that tool. These commands should be executed in a shell.

$ python3 -m venv venv
$ source venv/bin/activate
$ pip install stix2-patterns
$ validate-patterns
Enter a pattern to validate: [ipv4-addr:x_tags[*].name MATCHES '^country:(?!FR)\\w+']

PASS: [ipv4-addr:x_tags[*].name MATCHES '^country:(?!FR)\\w+']

In this example, we are trying to validate a STIX Patterning rule that contains a regular expression (MATCHES). This rule is considered valid and can be submitted to SEKOIA.IO.

How to Test STIX Patterning Rules?

When one creates a rule in SEKOIA.IO, this one is automatically validated and applied to incoming traffic.

In order to test your STIX Patterning rules, you can use an open source tool, called stix2-matcher. This tool is part of the official tools developed by the OASIS Technical Committee.

First, you need to retrieve a STIX “bundle” from SEKOIA.IO. To do so, go to the “events” page, find the event you want to work on, and export the STIX representation of that event:

Export STIX Representation of an Event from SEKOIA.IO

Export that STIX “bundle” in a file, called, for example, event.json. Here’s an example on how to use that tool. These commands should be executed in a shell. We are also using jq a tool that helps to manipulate JSON files.

$ python3 -m venv venv
$ source venv/bin/activate
$ pip install stix2-matcher
$ cat event.json | jq '.objects[] | select( .type | contains("observed-data") )' > observed-data.json
$ cat << EOF >| patterns
[ipv4-addr:value = '']
[x-dns-traffic:extensions.'x-log'.hostname = 'hostname']
$ stix2-matcher -f observed-data.json -p patterns

MATCH:  [ipv4-addr:value = '']

MATCH:  [x-dns-traffic:extensions.'x-log'.hostname = 'hostname']

Observed Data

In order to trigger alerts, rule patterns must match with Observed Data. An "Observed Data" is the internal representation of any collected event in SEKOIA.IO. All events are normalized into a JSON object compliant with the STIX Observed Data specification. Detection rules are applied on events in STIX Observed Data format.

Here is an example of an Observed Data that could be obtained from a squid event:

    "x_sic_entity_by_ref": "identity--d6358bb4-d9bb-47aa-b074-c6d1aeb673e2",
    "created": "2019-09-20T16:17:42.971Z",
    "objects": {
        "0": {
            "value": "",
            "type": "ipv4-addr"
        "1": {
            "value": "",
            "type": "ipv4-addr"
        "2": {
            "start": "2019-09-20T16:17:40.935Z",
            "type": "network-traffic",
            "end": "2019-09-20T16:17:40.935Z",
            "extensions": {
                "http-request-ext": {
                    "request_header": {
                        "Content-Type": "application/xml"
                    "request_method": "HEAD",
                    "request_value": ""
            "src_ref": "0",
            "dst_ref": "1",
            "protocols": [ "ipv4" ]
        "3": {
            "type": "user-account",
            "extensions": {
                "x-log": {
                    "hostname": "DESKTOP-UPU7IFP"
    "type": "observed-data",
    "x_event_type": "http"
The JSON object has a type of observed-data and is composed by smaller objects following another STIX specification: Cyber Observables.

The main observable is the third one, with a type of network-traffic. It has references to indicate the source of the packet (src_ref - and its destination (dst_ref -

These information can be used to construct correlation rules. Below, a non-exhaustive list of information which can be used in your rules:

  • ipv4-addr:value
  • ipv6-addr:value
  • domain-name:value
  • url:value
  • network-traffic:dst_port
  • network-traffic:src_port
  • network-traffic:dst_packets
  • network-traffic:src_packets
  • network-traffic:dst_ref.value (corresponding to IP value, in the above example, network-traffic:dst_ref refers to object 0, which has a value of '')
  • network-traffic:src_ref.value
  • network-traffic:extensions.'http-request-ext'.request_value
  • network-traffic:protocols[*]
  • process:pid
  • process:name
  • process:command_line
  • file:hashes.md5
  • user-account:account_login