Skip to content

Translate Sigma Rules into Elastic (ELK) detection rules

Notifications You must be signed in to change notification settings

amjcyber/sigma2elastic

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Sigma2Elastic

Simple PowerShell script that translates Sigma rules to Elastic Security/ELK detection rules. The main difference between this script and other automated solutions, like Uncoder, is that here you get an ndjson file that you can directly upload as a Rule fully configured.

The translator

This script is based on sigmac and not in the newer sigma-cli. Once this last is more mature I'll change this.

The parser

The parser has been slightly modified from the original one to match the out of the box index names. Could differ from others. Feel free to modify it.

No case sensitive

The biggest headache was to make queries no case sensitive. After many tries I decided to use the regex syntax available in Lucene query language. So queries will be like [Nn][Oo][Cc][Aa][Ss][Ee]. In order to help the reading of the queries I added them in no regex format in the investigation tab Example

Errors

Automated translation of the Sigma rules is not going to be perfect. Always test!

About

Translate Sigma Rules into Elastic (ELK) detection rules

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published