July 26, 2023
© 2023 SOC Prime Inc.
All rights reserved. This product and documentation related are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or documentation related may be reproduced in any form or by any means without the prior written authorization of SOC Prime. While every precaution has been taken in the preparation of this book, SOC Prime assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Threat Detection Marketplace
Applying Filters in the Code Tab
Now, you can apply Filters (extra conditions added on the fly to the detection logic before launching the query/deploying the rule) on the Code tab of a rule's page. Previously, Filters could be applied only via Presets as part of Automation.
Currently, Filters on a rule's page are available for the following content formats:
Microsoft Sentinel Query
Sumo Logic Query
Humio Query
Elastic Stack Query
Splunk Query
Chronicle Security Query
To manage your Filters, go to Platform Settings > Filters. To create a new filter, you can click the Create New Filter option right in the Filter selection dropdown.
Name your Filter, choose if you want to share it with your team, and define the extra conditions to be added.
Shared Data Planes in Jobs
To improve the UX during team collaboration, we've updated the way Data Planes created by other users from your team are displayed in Jobs.
On the Jobs page, the names of Data Planes created by other users are followed by the shared or not shared status.
The status depends on whether the user who created the Data Plane enabled the Share to Сompany switch in its settings.
The statuses are also displayed in the Job settings. Data Planes with not shared status are grayed out and cannot be added or removed from the Job.
Translation Improvements
Humio
We've improved the Sigma rule translations into Humio formats:
When a value includes the character
\it is escaped with\When a field in a Sigma rule has multiple values combined by OR and is modified by
contains, its translation has the following syntax:
Sigma | Humio |
selection:
| in(field=winlog.event_data.CommandLine,values=["*cscript.exe*", "*\\outlook.exe*", "*\\powerpnt.exe*"])
|
SentinelOne
We've improved translations from Sigma rules into SentinelOne formats:
Corrected capitalization of the
AnycaseoperatorImproved the syntax for the
INoperatorAdded escaping for the backslash character (
\)
Message for Empty Search Results
We've improved the message displayed when the user's search returned no results. Now, it offers more communication channels, and prompts the user to reach out to us for help in finding the right detection content.
Uncoder AI
Auto-Fix for Missing UUID
We've expanded the auto-fix capabilities. Now, if your Sigma rule misses the id component, you can automatically generate and add to your code a unique value of the proper format by clicking Fix for the corresponding warning in Warden.
API Endpoints
We've added the following API endpoints:
POST
/uncoder/reversefor reverse translationsPOST
/uncoder/ioc/parse-iocsfor parsing indicators of compromise (IOCs)POST
/uncoder/ioc/generate-queryfor generating queries based on parsed IOCs
Improved Flow of Opening Content
Now, when you select a Sigma rule in the search results, its code and intelligence open right away, saving you an extra click.
Attack Detective
Support for Sumo Logic
We've added support for Sumo Logic Data Planes. To run an Investigation in your Sumo Logic instance, first configure a Data Plane integration in Platform Settings > Data Planes.
Click Add Data Plane.
Name your profile, select Sumo Logic as your platform, and choose if you want to share the profile with your teammates.
Ensure the Attack Detective checkmark is set.
Fill in the fields that appeared in the Configuration section:
Deployment Region
Timezone
Access ID
Access Key
See this article to learn how to get credentials in Sumo Logic.
Click Save Changes.
Once you've set up the integration with your Data Plane, start an Investigation in Attack Detective using your Data Plane.
Support for On-Prem Splunk
We've added support for on-prem Splunk Data Planes. To run an Investigation in your on-prem Splunk instance:
Configure integration with your Splunk in Platform Settings > Data Planes by creating an on-prem Splunk Data Plane.
Click Add Data Plane.
Name your profile, select Splunk as your platform, and choose if you want to share the profile with your teammates.
Enable the On Prem switch.
Insert URL of your Splunk web console that you can copy from your browser.
Generate your Attack Detective API key to be used in the second step.
Click Save Changes.
Install the SOC Prime Attack Detective App for Splunk in your Splunk instance. This app connects your on-prem Splunk instance to Attack Detective. You can find more details on the configuration in this article.
Once you've set up the integration with your Data Plane, start an Investigation in Attack Detective using your Data Plane.
Launched Queries Calculation
We've improved the calculation of the total number of queries that are launched during an Investigation. Now, the final value is displayed at once while previously it was dynamically updated as queries were launched against different tables.
MITRE ATT&CK® Navigator
In the export from Data Audit, we've updated the MITRE ATT&CK® Navigator layer version to 4.4.
Hunting in Microsoft Defender for Endpoint
We've improved the mechanism of passing hunting queries via URL to Microsoft Defender for Endpoint. Now, the queries are passed right to the Advanced Hunting page, which enables the user to validate the hits faster.
Cyber Threat Search Engine
In the MITRE ATT&CK® View, we've made empty tactics and techniques hidden by default to help the user focus on what is covered by the search results. To show tactics and techniques without content mapped to them, click the eye icon.
Platform Guides
We've updated the Platform Guides according to the new functionality.
Key Bug Fixes & Improvements
With this release, we’ve made the following key bug fixes and improvements to enhance the user experience with the SOC Prime Platform:
Resolved issues in Uncoder AI:
Fixed a bug where SentinelOne translations failed to generate in certain time periods
Improved parsing of domains and file names with a leading slash, such as
\example.comand\test.txt, for the generation of IOC-based queriesImproved error handling for Microsoft Defender for Endpoint translations by showing a specific reason why certain Sigma rules cannot be translated rather than a general error message
Fixed duplicate options in the output selection dropdown when generating queries based on parsed IOCs
Fixed a bug where an item selected on a page of the search results stays highlighted as selected on all other pages
Improved remapping to OCSF for Splunk
Fixed a bug in Automation where an error message about failing to delete content from GitHub inventory and the GitHub repo had a success header
Improved applying Filters to Splunk queries. Now, they are added at the end of the query to avoid overloading Splunk
Fixed a bug in Automation where certain content deploy Jobs did not start automatically for a short while
Fixed a bug with Custom Field Mapping for Splunk where the Source mapping wasn't applied correctly if a specific custom value was set
Resolved issues in Attack Detective:
Improved the Yaml format check in Warden that previously under some conditions could produce false positive results
Fixed a bug with search in CrowdStrike where the user was navigated to falcon.crowdstrike.com instead of the URL configured in their CrowdStrike Data Plane
Fixed an issue with API where an error was returned if the tags.sigma_type field contained a string instead of an array
Fixed a bug where after editing a query for Elastic, CrowdStrike or Microsoft Defender for Endpoint on a rule's page, the original version of the query was deployed
Fixed a bug in TDM's Overview where decimals were displayed instead of integers on the Rule Usage Compared to Industry dashboard
