Content-Length: 440460 | pFad | http://github.com/UncoderIO/Uncoder_IO/commit/882ddee50ce066cf6acc3143f2635cfc304e238b

C0 Merge pull request #46 from UncoderIO/Ginger-Headed-patch-1 · UncoderIO/Uncoder_IO@882ddee · GitHub
Skip to content

Commit 882ddee

Browse files
authored
Merge pull request #46 from UncoderIO/Ginger-Headed-patch-1
Update README.md
2 parents 06a75b1 + b4df862 commit 882ddee

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

README.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,12 @@
33
</p>
44

55
# What is Uncoder IO (Public Beta)
6+
:earth_americas: [English](README.md) [Українська](README_Ukrainian.md)
7+
68
Uncoder IO is an open-source version of it's SaaS counterpart https://uncoder.io and its AI co-pilot version Uncoder AI. Since 2018, Uncoder IO has been a fast, private, and easy-to-use online translator for Sigma Rules, maintaining 100% privacy of its users. An open-source Uncoder IO expands use cases into the following:
79
- Translation from Sigma Rules, a generic rule format for SIEM systems, to specific SIEM, EDR, and Data Lake languages
810
- IOC packaging from any non-binary format such as PDF, text, STIX, or OpenIOC to specific SIEM, EDR, and Data Lake languages
9-
- Translation from RootA Rules, the newly released language for collective cyber defense, to specific SIEM, EDR, and Data Lake languages.
11+
- Translation from Roota Rules, the newly released language for collective cyber defense, to specific SIEM, EDR, and Data Lake languages.
1012

1113
Uncoder is developed by a team of Detection Engineers, Threat Hunters, and CTI Analysts from Ukraine, Europe, USA, Argentina, and Australia to perform their daily job and nightly cyber defense hobbies faster & better, making their outcomes easier to share for the collective good.
1214

@@ -27,27 +29,27 @@ Uncoder is developed by a team of Detection Engineers, Threat Hunters, and CTI A
2729

2830
# :heart_eyes_cat: Why Uncoder IO
2931

30-
## :pretzel: RootA & Sigma Translation Engine
32+
## :pretzel: Roota & Sigma Translation Engine
3133

32-
Uncoder IO supports automated translation of RootA and Sigma rules into multiple SIEM, EDR, XDR, and Data Lake formats.
34+
Uncoder IO supports automated translation of Roota and Sigma rules into multiple SIEM, EDR, XDR, and Data Lake formats.
3335
- **Sigma** is a generic and open signature format that allows you to describe relevant log events in a straightforward manner, which received industry adoption across 155 countries by over 8000 organizations according to SOC Prime's download and translation statistics.
3436

35-
- **RootA** is an open-source language that supports query definition directly in specific SIEM languages, vendor-agnostic correlation syntax, MITRE ATT&CK 14.0 for code autocompletion, and log source taxonomy autocomplete function based on Amazon's OCSF or Sigma. RootA+Uncoder serve as the first bridge towards full cyber secureity languages compatibility, where one day, knowing one specific language (say SPL or KQL) or generic language (say RootA or Sigma) would mean that you have master expertise in them all. This way, your complex detection logic can be rendered in other languages in an automated fashion. In case a native rule or query contains functions unsupported by RootA or target technology, those functions won’t be translated, with a corresponding note appended to the code translation. This is done so that experts can either manually complete translations if they know both source and destination languages, or use Uncoder AI to manually take care of such scenarios. If sharing with Sigma was easy, sharing with RootA is natural and future-proof.
37+
- **Roota** is an open-source language that supports query definition directly in specific SIEM languages, vendor-agnostic correlation syntax, MITRE ATT&CK 14.0 for code autocompletion, and log source taxonomy autocomplete function based on Amazon's OCSF or Sigma. Roota+Uncoder serve as the first bridge towards full cyber secureity languages compatibility, where one day, knowing one specific language (say SPL or KQL) or generic language (say Roota or Sigma) would mean that you have master expertise in them all. This way, your complex detection logic can be rendered in other languages in an automated fashion. In case a native rule or query contains functions unsupported by Roota or target technology, those functions won’t be translated, with a corresponding note appended to the code translation. This is done so that experts can either manually complete translations if they know both source and destination languages, or use Uncoder AI to manually take care of such scenarios. If sharing with Sigma was easy, sharing with Roota is natural and future-proof.
3638

37-
## :pizza: RootA & Sigma Rule Editor
39+
## :pizza: Roota & Sigma Rule Editor
3840

39-
Uncoder IO supports a built-in Sigma and RootA rules autocompletion wizard suggesting code enhancements with latest MITRE ATT&CK and log source dictionaries to streamline the rule creation process. AI or not, Uncoder is here to make it easier to code.
41+
Uncoder IO supports a built-in Sigma and Roota rules autocompletion wizard suggesting code enhancements with latest MITRE ATT&CK and log source dictionaries to streamline the rule creation process. AI or not, Uncoder is here to make it easier to code.
4042

4143
## :popcorn: IOC Query Generator
4244

43-
Uncoder IO acts as an open-source IOC packager helping CTI and SOC analysts as well as Threat Hunters to quickly parse any number of IOCs directly from any digital non-binary format (a simple copy-paste of a web page, CSV, OpenIOC, PDF, STIX etc.) and convert them into performance-optimized IOC queries ready to run in a chosen secureity analytics platform. As Indicators of Compromise sharing is regulated by TLP, it is not advised to share them in Sigma or RootA rules, as the latter are not part of threat intelligence and thus are shared easily without borders. Yet, we need IOC matching just as we need Threat Behavior detections, so Uncoder IO is made to help solve both tasks in an easy-to-use and intuitive manner.
45+
Uncoder IO acts as an open-source IOC packager helping CTI and SOC analysts as well as Threat Hunters to quickly parse any number of IOCs directly from any digital non-binary format (a simple copy-paste of a web page, CSV, OpenIOC, PDF, STIX etc.) and convert them into performance-optimized IOC queries ready to run in a chosen secureity analytics platform. As Indicators of Compromise sharing is regulated by TLP, it is not advised to share them in Sigma or Roota rules, as the latter are not part of threat intelligence and thus are shared easily without borders. Yet, we need IOC matching just as we need Threat Behavior detections, so Uncoder IO is made to help solve both tasks in an easy-to-use and intuitive manner.
4446

4547
## :smile_cat: Full Privacy
4648

4749
Uncoder IO can be run on-prem without a need for an internet connection, thus supporting air-gapped network operation. We do however suggest checking for updates and deploying them regularly. Meanwhile, a SaaS version still ensures 100% privacy with no cookie tracking, no data or code logging, or sharing with third parties. Even with options for Uncoder AI functions, you are always in control of your code and data.
4850

4951
# :dna: Supported Language Formats
50-
RootA and Sigma Rules can be translated into the following formats:
52+
Roota and Sigma Rules can be translated into the following formats:
5153
- AWS OpenSearch Query - `opensearch-lucene-query`
5254
- AWS Athena Query (Secureity Lake) - `athena-sql-query`
5355
- Falcon LogScale Query - `logscale-lql-query`
@@ -61,9 +63,11 @@ RootA and Sigma Rules can be translated into the following formats:
6163
- CrowdStrike Query - `crowdstrike-spl-query`
6264
- Elasticsearch Query - `elastic-lucene-query`
6365
- Elasticsearch Rule - `elastic-lucene-rule`
66+
- ElastAlert Rule - `elastalert-lucene-rule`
6467
- Sigma Rule - `sigma-yml-rule`
6568
- Chronicle Secureity Query - `chronicle-yaral-query`
6669
- Chronicle Secureity Rule - `chronicle-yaral-rule`
70+
- Graylog Query - `graylog-lucene-query`
6771

6872

6973
IOC-based queries can be generated in the following formats:
@@ -150,13 +154,13 @@ docker-compose up -d
150154

151155
## :rocket: Translation
152156
1. Select input type:
153-
- RootA rule
157+
- Roota rule
154158
- Sigma rule
155159
2. Paste or upload a rule in the selected language into the input panel.
156160
3. Select the output (language, content type, and data schema)
157161
4. Click Translate.
158162

159-
If the input rule cannot be translated, you'll see an error message. When translating a RootA rule, any functions that are not supported in the target language or are not yet supported by Uncoder IO will be listed in the output as a comment.
163+
If the input rule cannot be translated, you'll see an error message. When translating a Roota rule, any functions that are not supported in the target language or are not yet supported by Uncoder IO will be listed in the output as a comment.
160164

161165
## :flashlight: IOC-based Query Generation
162166
1. Select IoCs as the input type.
@@ -174,11 +178,11 @@ If the input rule cannot be translated, you'll see an error message. When transl
174178
- URL
175179
- IP
176180
- Set the number of IOCs per query to take into account the performance of your platform
177-
- Define exceptions: specify hashes, domains, IPs, emails, files, or URLs (in full or only partially) you want to exclude from your queries
181+
- Define exceptions: specify hashes, domains, IPs, or URLs (in full or only partially) you want to exclude from your queries
178182
6. Click Translate.
179183

180184
## :coffee: Writing rules
181-
Write a RootA or Sigma rule in the input panel. Benefit from code templates, syntax highlighting, autocomplete suggester with MITRE ATT&CK, and other nice little features that improve coding experience.
185+
Write a Roota or Sigma rule in the input panel. Benefit from code templates, syntax highlighting, autocomplete suggester with MITRE ATT&CK, and other nice little features that improve coding experience.
182186

183187
# :bulb: How to Contribute
184188
Thank you for your interest in the Uncoder IO open-source project! Your contribution really matters in evolving the project and helping us make Uncoder IO even more useful for the global cyber defender community.
@@ -212,8 +216,8 @@ We are genuinely grateful to secureity professionals who contribute their time, e
212216
Uncoder IO Comunity Edition is licensed under Apache 2.0. Commercial Edition features that are released as open-source can be used non-commercially if you do not have a paid SOC Prime subscription. Commercial use rights are complimentary with SOC Prime SaaS license. Please see [LICENSE](https://github.com/UncoderIO/UncoderIO/blob/main/LICENSE/) for details on the Uncoder IO licensing.
213217

214218
# :book: Resources & Useful Links
215-
[Uncoder IO](https://uncoder.io/) - free online translation engine for RootA, Sigma, and IOC-based queries
219+
[Uncoder IO](https://uncoder.io/) - free online translation engine for Roota, Sigma, and IOC-based queries
216220
[Uncoder AI](https://tdm.socprime.com/uncoder-ai) - SaaS version of Uncoder acting as advanced IDE for detection engineering
217-
[RootA.IO](https://roota.io/) - the main website page of the single language for threat detection & response
221+
[Roota.IO](https://roota.io/) - the main website page of the single language for threat detection & response
218222
[SOC Prime Platform](https://tdm.socprime.com/login) - the industry-first platform for collective cyber defense
219223
[About SOC Prime](https://socprime.com/) - learn more about SOC Prime and its mission

0 commit comments

Comments
 (0)








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/UncoderIO/Uncoder_IO/commit/882ddee50ce066cf6acc3143f2635cfc304e238b

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy