TheDocumentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
/api/v1/iocs/sigma endpoint exports IOCs from the SOC Defenders feed as multi-document Sigma YAML — one detection rule per indicator. Each rule targets a specific log source and detection pattern for the corresponding IOC type, and includes MITRE ATT&CK tags where applicable. The output is compatible with sigmac, pySigma, and any SIEM that supports the Sigma standard, including Splunk, Microsoft Sentinel, Elastic, and QRadar. Apply filters to scope the export to a specific IOC type, time window, or confidence level.
Request
Method:GETURL:
https://socdefenders.ai/api/v1/iocs/sigmaAuth: Required —
Authorization: Bearer sk_live_YOUR_KEYTier: Pro
Content-Type:
application/yaml (multi-document YAML)
This endpoint requires a Pro subscription. Requests made with a Free-tier key will receive a
403 Forbidden response.Query parameters
Filter by IOC type. One of:
ipv4, ipv6, domain, url, md5, sha1, sha256, cve, mitre-attack, email.ISO 8601 timestamp. Returns rules only for IOCs added or updated after this time (e.g.
2024-01-01T00:00:00Z).Filter by confidence level. One of:
high, medium, low.Filter by CISA sector name (e.g.
energy, healthcare, financial-services).Maximum number of Sigma rules to return. Pro tier: up to 10,000.
Example request
Response
The response body is a multi-document YAML file. Each YAML document (separated by---) is a complete, standalone Sigma rule for one IOC.
Rule fields
Human-readable rule title, including the IOC value.
Unique UUID for this Sigma rule. Stable across exports for the same IOC.
Rule maturity status. Exported rules are
experimental.Plain-text description of what the rule detects and its data source.
List of reference URLs. Always includes
https://socdefenders.ai.Sigma log source definition specifying the category and product the rule targets.
Sigma detection logic, including field-value match criteria and the condition expression.
Severity level for the rule. One of:
critical, high, medium, low, informational.MITRE ATT&CK tags associated with the rule (e.g.
attack.command_and_control).