March 8, 2023
© 2023 SOC Prime Inc.
All rights reserved. This product and documentation related are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or documentation related may be reproduced in any form or by any means without the prior written authorization of SOC Prime. While every precaution has been taken in the preparation of this book, SOC Prime assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Content Quality Improvements
We've made multiple improvements in translations of Sigma rules into the following platform formats.
Microsoft Sentinel and Microsoft Defender for Endpoint
Added
@before string values in translations of Sigmaconditioncomponents where it was missing. For example, this fragment of a Sigma rule:
detection:
selection:
CommandLine:
- 'example'
condition: selection
now translates into:
where (CommandLine =~ @'example')
Applied
inoperator to translations where a list of values is present in the source Sigma rule. For example, this fragment of a Sigma rule:
detection:
selection1:
CommandLine:
- 'example1'
- 'example3'
selection2:
CommandLine:
- 'example2'
- 'example4'
condition: selection1 or selection2
now translates into:
where (CommandLine in~ (@'example1', @'example3') or CommandLine in~ (@'example2', @'example4'))
Improved the syntax in translations of components with
AND NOToperator. For example, this fragment of a Sigma rule:
detection:
selection1:
CommandLine:
- 'example1'
selection2:
CommandLine:
- 'example2'
condition: selection1 and not selection2
now translates into:
where (CommandLine =~ @'example1' and not (CommandLine =~ @'example2'))
Chronicle Security
Improved the syntax in translations of components with
AND NOToperator. For example, this fragment of a Sigma rule:
detection:
selection1:
CommandLine:
- 'example1'
selection2:
CommandLine:
- 'example2'
selection3:
CommandLine:
- 'example3'
condition: selection1 and selection2 and not selection3
now translates into:
target.process.command_line = "example1" and target.process.command_line = "example2" and target.process.command_line != "example3"
Made Sigma rules with the
conditioncomponent of the following types non-translatable into the Chronicle Security formats:selection1 and selection2 or selection3selection1 or selection2 and not selection3
Resolved an issue that in some cases prevented the generation of Chronicle Security Query translation for a Sigma rule with
contains|allmodifier.
Splunk
Fixed cases where
AND NOToperator in the translation contained a double space.
Sumo Logic
Improved the syntax in translations of components with
AND NOToperator. For example, this fragment of a Sigma rule:
condition: selection1 or selection2 and not selection3
where product: windows, now translates into:
((_sourceCategory=*windows* AND (((CommandLine = selection1) OR (((CommandLine = selection2) AND NOT (CommandLine = selection3)))))))
Improved processing of
ORoperator combining list values withcontains|allmodifier. So, now the following fragment of a Sigma rule:
detection:
selection_dll:
ImageLoaded|endswith:
- '\MpClient.dll'
filters:
- ImageLoaded|contains|all:
- 'Program'
- 'Files'
- 'Windows'
- 'Defender'
- ImageLoaded|contains|all:
- 'ProgramData'
- 'Microsoft'
- 'platform'
- 'Windows'
- 'Defender'
condition: selection_dll and not filters
translates into:
("\MpClient.dll") AND !((Program AND Files AND Windows AND Defender) OR (ProgramData AND Microsoft AND platform AND Windows AND Defender))
Microsoft Defender for Endpoint
Updated the logic of translation generation. If a Sigma rule includes any of the unsupported fields, translation won't be generated. If a Sigma rule includes an
EventIDand hasservice: sysmoninlogsources, translation will be generated without theEventID.
QRadar
Improved the syntax in translations of components with keywords. For example, this fragment of a Sigma rule:
detection:
keywords0:
- 'logdesc="Application crashed"'
keywords1:
- 'application: sslvpnd'
condition: all of them
now translates into:
UTF8(payload) ILIKE '%logdesc="Application crashed"%' AND UTF8(payload) ILIKE '%application: sslvpnd%'
AWS Athena
As part of our constant effort to expand the list of supported security technologies, we've added support for a new platform, AWS Athena. Sigma rule translations are available for both standard schema and OCSF (Open Cybersecurity Schema Framework).
To filter for content translated into this platform format, use the Platform filter in Advanced Search or Detection Engineering.
We've also added this platform to the Threat Bounty Portal.
Integration Environments
Improved Configuration Flow
We've updated and simplified the process of configuring an integration environment. Now, instead of setting up each type of integration with your environment separately on different tabs, you can define all integration parameters in one place.
To see what parameters you need to specify, first select where you want to use the integration:
Depending on your choice, you'll see a set of fields to be filled out.
Chronicle Security
To simplify the configuration of an integration environment for this platform, we've returned the capability to import credentials from a JSON.
On Demand Versions Updated
To align our offerings with the needs of security experts, we've updated the available versions of the On Demand subscription plan. Now, they are as follows:
50+500* rules (sigma2savelives)
125 rules
250 rules
600 rules
CCM API Improvements
We've improved our Continuous Content Management (CCM) API architecture to make it more reliable and facilitate further development.
Also, now users can pass the default value in the mapping_name parameter to the /v1/search-sigmas and /v1/content-list endpoints to apply a default Custom Field Mapping profile to each content item in the response.
Dashboards on the Home Page
To improve the user experience, we've updated the colors used in the Content Usage and Usage Trend Compared to Industry dashboards.
Platform Guides
We've updated our Platform Guides to keep them consistent with the new functionality on the SOC Prime Platform.
Key Bug Fixes & Improvements
With this release, we’ve made the following key bug fixes and improvements to enhance the user experience with the SOC Prime Platform:
Fixed a bug where in some cases IP addresses were not recognized in Uncoder.IO.
Improved Leaderboards:
Fixed a bug in the mobile version of the Home Page where the circle with the percentage of covered techniques/sub-techniques was not displayed.
Resolved an issue with values in Custom Field Mapping where in some cases a new value in additional value{Old Value} format mapped to an old value for a specific field was applied to all fields rather than to the field specified in settings.
Fixed a bug with CCM API where in responses from endpoints
/v1/content-listand/v1/jobs/{job_id}/get-contentvalues of thetags.techniquefields in rules in some cases were empty.
