The SOC Defenders Sigma endpoint converts your filtered IOCs into deployable Sigma detection rules. Each IOC becomes its own YAML rule document, separated byDocumentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
--- in the multi-document response. You can pipe the output directly into sigmac or pySigma to compile rules for your target SIEM without writing any detection logic manually.
Sigma export requires a Pro subscription. Upgrade at socdefenders.ai.
Endpoint
GET /api/v1/iocs/sigma
The response is a multi-document YAML file. Each document is a valid Sigma rule for one IOC, delimited by ---.
Authentication
Pass your API key as a Bearer token in theAuthorization header.
Query parameters
| Parameter | Type | Description |
|---|---|---|
type | string | Filter by IOC type: ipv4, ipv6, domain, url, md5, sha1, sha256, cve, email |
since | string | ISO 8601 timestamp — return only IOCs added after this date |
confidence | string | low, medium, or high |
industry | string | CISA Critical Infrastructure sector slug |
Example request
Sample Sigma rule output
The following shows a single rule document from the multi-document response:id, references back to SOC Defenders, and maps to relevant MITRE ATT&CK tags where available.
Deploying Sigma rules to your SIEM
Sigma rules are backend-agnostic YAML. Usesigmac (legacy) or pySigma (recommended) to compile them into queries your SIEM understands.
Download the rule file
Run the curl example above to save all rules to a
.yml file. Use the type and confidence filters to limit the output to IOCs relevant to your environment.Install pySigma and your backend
Install the pySigma core library and the backend plugin for your SIEM:
Compile rules for your SIEM
Convert the multi-document YAML to your target query language. The example below targets Splunk:Replace
-t splunk with -t qradar, -t elastic, -t sentinel, or any other supported backend.