Skip to main content
GET
/
api
/
v1
/
iocs
/
sigma
curl -H "Authorization: Bearer sk_live_..." \
  "https://socdefenders.ai/api/v1/iocs/sigma?type=domain&confidence=high&limit=50" \
  -o socdefenders-domains.yml
"title: SOC Defenders — Malicious Domain c2.example.com\nid: 8f3a4d1e-7b2c-5a9e-9f6d-3a8b1c7e2f4d\nstatus: experimental\ndescription: Detects DNS queries to c2.example.com, observed in \"New botnet observed beaconing\"\nreferences:\n  - https://socdefenders.ai/threats/6fc99fbc-2c24-4ce2-8b42-48065d4976e7\nauthor: SOC Defenders Threat Intelligence Feed\ndate: 2026-05-17\ntags:\n  - attack.command_and_control\n  - attack.t1071\nlogsource:\n  category: dns\ndetection:\n  selection:\n    QueryName|endswith: 'c2.example.com'\n  condition: selection\nlevel: high\nfalsepositives:\n  - Legitimate use of the domain (rare for indicators in this feed; verify in context).\n---\ntitle: SOC Defenders — Malicious SHA256\nid: a1b2c3d4-e5f6-7890-abcd-ef1234567890\n..."

Documentation Index

Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt

Use this file to discover all available pages before exploring further.

Authorizations

X-API-Key
string
header
required

API key in X-API-Key header

Query Parameters

type
enum<string>

Restrict to a single IOC type. Omit to generate a mixed-source rule pack.

Available options:
ipv4,
ipv6,
domain,
url,
md5,
sha1,
sha256
Example:

"domain"

confidence
enum<string>

Only emit rules for IOCs at this confidence level. Default emits all confidences.

Available options:
high,
medium,
low
Example:

"high"

since
string<date-time>

Generate rules for IOCs first seen after this ISO 8601 timestamp. Defaults to last 7 days.

Example:

"2026-05-10T00:00:00Z"

limit
integer
default:100

Maximum number of rules to generate (1–1000).

Required range: 1 <= x <= 1000
Example:

50

Response

Multi-document Sigma YAML — one rule per IOC, separated by ---. Save to a .yml file and drop into your SIEM rules repo.

The response is of type string.