Coder Social home page Coder Social logo

3coresec / siegma Goto Github PK

View Code? Open in Web Editor NEW
138.0 10.0 20.0 1.03 MB

SIEGMA - Transform Sigma rules into SIEM consumables

Home Page: https://blog.3coresec.com/search/label/DaC

License: GNU Affero General Public License v3.0

Python 100.00%
sigma detection-engineering siem security data-driven

siegma's People

Contributors

0xtf avatar diogobraz avatar heyibrahimkhan avatar w0rk3r avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

siegma's Issues

One output file for rules in a directory

Currently, for every rule, only 1 output file is created that contains the last rule that was converted.
So only one rule is installed on the SIEM currently.

This logic needs to be updated so all rules from a directory get added to the same output file.
And in one single push, all rules get installed on SIEM.

Problem with multiple detections in one file

It looks like there is an issue when detecting multiple documents in one file.
This is the file that leads into the following issue for me:
https://github.com/SigmaHQ/sigma/blob/master/rules/linux/auditd/lnx_auditd_cve_2021_3156_sudo_buffer_overflow.yml

  in "sigma/rules/linux\auditd\lnx_auditd_cve_2021_3156_sudo_buffer_overflow.yml", line 1, column 1
but found another document
  in "sigma/rules/linux\auditd\lnx_auditd_cve_2021_3156_sudo_buffer_overflow.yml", line 23, column 1 occurred in main of file siegma.py...
04/01/21T11:45:43Z:ERROR:Ending script with error code: 1```

pySigma support?

Hi! Just stumbled upon your project, looks really cool.

I'm currently building a detection-as-code pipeline for QRadar SIEM, but using pySigma, since sigmac is deprecated.
Is there any plan to support pySigma in the future?

Fields passed as arguments

General idea: While there are many fields in a particular config that are set per environment a few can be dependent on a particular rule. For example, we might wish to associate a timeline_id from Elastic SIEM to a particular rule or rule folder.

With the possibility of passing arguments for a specific configuration we can provide additional functionality that aids in automation while refraining from hard coding fields in the config.

Example:

siegma.py ARGUMENTS -f timeline_id=111,timeline_description=222

Just an idea. Feedback welcome.

Add custom risk score capability

Currently, risk score is set based on the risk level (low 25, medium 50, high 75 and critical 100) received from field "level" yml rule file.

Need to add a logic where risk_score in elastic output can be based on a custom field "score" in .yml file.

@DiogoBraz @0xtf , What do you think?

Elastic Convert Locally

Hi,
I'm trying to convert rules to elastic in locally without connecting to Kibana, and always reports me same error.
curl: (3) URL using bad/illegal format or missing URL.
If I set the Kibana config it works, but always send a curl to check if the rule exists.
Can you enable a option to don't made a check to kibana server ? In testing mode don't upload automatically the rule, but it send the request to validate if exist the rule in kibana.

Thanks

Testing Logic

Add testing logic so rule is not installed on SIEM upon testing.

Testing can be specified from the commandline.

Logo - Greek alphabet off-by-some

The 'E' in the Greek alphabet is epsilon.

The 'S' is Sigma.

Everytime I look at the logo with a Σ for a lower case 'e' I die a little inside, and I'm not even Greek.

Any chance of fixing it?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.