August 7, 2024
© 2024 SOC Prime Inc.
All rights reserved. This product and documentation related are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or documentation related may be reproduced in any form or by any means without the prior written authorization of SOC Prime. While every precaution has been taken in the preparation of this book, SOC Prime assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Uncoder AI
Language Autodetect
We've added source language autodetect based on AI prediction. It is applied automatically once the user pastes the code or stops writing it in the input editor.
If the user manually selects an option in the source language dropdown, the autodetection is no longer applied. To apply it, the user has to select the Detect Platform with AI option in the source language dropdown.
Supercharge Mode
We've introduced the Supercharge mode where you can turn a platform-specific rule or query into a Roota rule and enrich it with metadata using AI.
To enter the Supercharge mode, click the Roota icon:
If the input editor contains code, supercharging starts automatically
If no code is present, paste or write a query/rule and click Supercharge
When supercharging, the following Roota rules are filled using our proprietary technology and AI models:
tram-tags– MITRE ATT&CK tags predicted by our version of the TRAM LLMtimeline– key dates of the activities related to the threat the rule detectslogsource– possible log sources are defined where not specified in the original content. Additionally, the audit section is filled that specifies what logging service should be enabled to have the logs required and how to enable itfalse-positives– Possible false positives or benign activities predicted by AItriage_recommendations– Possible actions for validating and investigating malicious activity suggested by AI
Currently, supercharging is supported for the following formats:
Microsoft Sentinel Query
Microsoft Sentinel Rule
Splunk Query
Splunk Alert
Crowdstrike Endpoint Security Query
Elastic Stack Query (Lucene)
Elastic Stack Detection Rule (Lucene)
AWS OpenSearch Query
Falcon LogScale Alert
Falcon LogScale Query
Microsoft Defender for Endpoint Query
Sigma Rule
AWS Athena Query
Chronicle Security Query
Chronicle Security Rule
Additionally, you can look up for content in these formats and open them in the Search panel in the Supercharge mode. To filter by format, use the Choose Platform filter.
Once a Roota is generated, you can:
Save it and additionally generate a translation into any of the supported languages
Look up for similar content on Threat Detection Marketplace
Attack Detective
Use Cases
To improve and streamline the user experience, we've organized functionality with use cases:
Data Audit. Address threat detection blind spots with an actionable plan, generated by mapping data collected in your SIEM to ATT&CK. All finished Data Audits are listed on the Audits page.
Rules for Alerting. Discover the best Detection Rules for your SIEM, configure and deploy them to generate low-noise high-value Alerts. All finished Rules for Alerting Scans are listed on the Scans page.
Threat Hunting. Act faster than Attackers by automating routine Threat Hunting tasks, correlating findings with ATT&CK and latest CTI. All Threat Hunting Scans are listed on the Scans page.
Content Audit (сoming soon). Improve Threat Visibility by auto-mapping your Rules & Queries to MITRE ATT&CK with AI which does not leak your code. All finished Content Audits are listed on the Audits page.
You can navigate to each of the use cases right from the main page or a dedicated header menu.
The main difference introduced with this release is the final separation of Scans and Audits into two different entities.
Scans include two types of use cases: Rules for Alerting and Threat Hunting. A Scan does not have a full Data Audit as its part. It only shows identified log sources and attack visibility while offering no information on blind spots. To learn about the blind spots in your environment, follow the Data Audit use case. The default period for Rules for Alerting is 7 days, for Threat Hunting 24 hours
Audits include two types of use cases: Data Audit and Content Audit (coming soon). The result of an Audit is the spider charts that show the percentage of techniques in each tactic that can be detected with the existing log sources and potential attack visibility after implementing recommendations for resolving blind spots. The default period for a Data Audit is 90 days.
Audits and Scans are counted separately. The counters are shown on the Account Details page. Any failed scans are not counted towards subscription plan limits.
Exportable Reports
We've added the possibility to form XLSX reports based on scan results. Once generated, the report can be found and downloaded on the Reports page.
You can create the following reports:
For Scans:
Overview Report
Hitmap Content Report
For Audits:
Data Audit CSV
Data Audit DeTT&CT
User Session Termination
We've added a possibility for Managers to terminate the session of any user on their team. To do that:
Go to Team Management.
Click three dots next to the selected user name.
Choose Terminate Session.
Confirm the action in the modal that appears
A success message appears at the top of the screen.
Key Bug Fixes & Improvements
Fixed a bug on the Search page where forking a rule to a custom repository failed under some circumstances
Corrected the use of regexes in CrowdStrike-Query-Language-(CQL) alternative translations
Resolved an issue where reverse translation from Chronicle Security could fail if capital letters were present in the code
Fixed an issue where the Subscribe icon was missing for the Solo plan in Uncoder AI
Fixed issues where deploying a Sumo Logic Query, Sumo Logic CSE Rule or Microsoft Sentinel rule from the rule's page failed under some conditions
Improved handling of the 429 errors when querying a Microsoft Defender for Endpoint Data Plane in Attack Detective to prevent failed Scans
Now backend error messages in Attack Dettective are displayed in modal windows to ensure usability
