SecurityRiskAdvisors / Talr

Threat Alert Logic Repository

Programming Languages

shell
77523 projects

Labels

Projects that are alternatives of or similar to Talr

GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-34.21%)
Mutual labels:  siem
blue-teaming-with-kql
Repository with Sample KQL Query examples for Threat Hunting
Stars: ✭ 102 (+34.21%)
Mutual labels:  siem
Nzyme
Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
Stars: ✭ 507 (+567.11%)
Mutual labels:  siem
skalogs-bundle
Open Source data and event driven real time Monitoring and Analytics Platform
Stars: ✭ 16 (-78.95%)
Mutual labels:  siem
awesomekql
Azure Sentinel intrusion detection rules, recent exploits and lolbas :)
Stars: ✭ 16 (-78.95%)
Mutual labels:  siem
Meerkat
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (+273.68%)
Mutual labels:  siem
siembol
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
Stars: ✭ 153 (+101.32%)
Mutual labels:  siem
Siem From Scratch
SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
Stars: ✭ 31 (-59.21%)
Mutual labels:  siem
ansible-splunk-playbook
Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook
Stars: ✭ 34 (-55.26%)
Mutual labels:  siem
Event Forwarding Guidance
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
Stars: ✭ 605 (+696.05%)
Mutual labels:  siem
siemstress
Very basic CLI SIEM (Security Information and Event Management system).
Stars: ✭ 24 (-68.42%)
Mutual labels:  siem
Kong-API-Manager
Kong API Manager with Prometheus And Graylog
Stars: ✭ 78 (+2.63%)
Mutual labels:  siem
Sigma
Generic Signature Format for SIEM Systems
Stars: ✭ 4,418 (+5713.16%)
Mutual labels:  siem
detection-rules
Threat Detection & Anomaly Detection rules for popular open-source components
Stars: ✭ 34 (-55.26%)
Mutual labels:  siem
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+789.47%)
Mutual labels:  siem
cli-eaa
CLI for Enterprise Application Access (EAA)
Stars: ✭ 19 (-75%)
Mutual labels:  siem
Attackdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (+247.37%)
Mutual labels:  siem
Project Sauron
Tools to create a Native Windows Audit Collection Platform. Active Directory example provided
Stars: ✭ 58 (-23.68%)
Mutual labels:  siem
Graylog2 Server
Free and open source log management
Stars: ✭ 5,952 (+7731.58%)
Mutual labels:  siem
Security Apis
A collective list of public JSON APIs for use in security. Contributions welcome
Stars: ✭ 508 (+568.42%)
Mutual labels:  siem

TALR_logo

Threat Alert Logic Repository (TALR)

A public repository for the collection and sharing of detection rules in STIX format. Collected rules are appended with STIX required fields for simplified sharing over TAXII servers.

Contains tools useful for translating rules from STIX to Sigma, and automating their ingestion/translation.

  • Rules can be found in Sigma format in /Rules/
  • Rules can be found as STIX bundles in /Bundles/
  • Tool for unpacking bundles (stix2sigmac) in /Tools/

Projects in use / Thanks:

TALR Vision

Sharing SIEM Rules via STIX/TAXII, which enables:

  • Highly scalable sharing of SIEM rules by translating sigma style rules to STIX objects. This allows for sharing over TAXII.
  • Tactical and informed response. By pulling down STIX objects related to SIEM rules that fired, you can inform your response based on the the Threat Actor, Campaign, TTP, indicators, etc. that may be related.
  • Automated ingestion of new SIEM Rules by running new STIX bundles through stix2sigmac, and recieving new SIEM rules in the syntax of your choice.
  • Benchmarking rules against similar organizations by sharing rules and intel over shared TAXII servers, keeping each other updated with observed and industry-specific SIEM content.
  • Easier transition between SIEM vendors, as stix2sigmac organizes and stores a local copy of every rule run through it in sigma format.

stix2sigmac Requirements:

Only required if using tools.

  1. Python3 - required for pip sudo apt-get install python3
  2. Pip - required to install the things sudo apt-get install python3-pip
  3. JSON to YAML - required for stix2sigmac pip3 install json2yaml
  4. sigmatools - required for stix2sigmac pip3 install sigmatools
  5. OPTIONAL: figlet - for the intro banner sudo apt-get install figlet
  6. Reboot

Using stix2sigmac

stix2sigmac will parse through a STIX bundle, locate the detection rules, store them locally in yaml, and translate them to the SIEM query syntax specified.

To test this, we have made 2 bundles available in the /Bundles directory.

  • sigma_bundle.json - STIX bundle of entire sigma repository
  • sra_bundle.json - STIX bundle of a sampling of SRA created sigma rules

To unpack these bundles, run stix2sigmac against them, using the following syntax: ./stix2sigmac import [PRODUCT_TYPE or CATEGORY or SERVICE or ATTACK_TACTIC] [/DIRECTORY/WITH/STIX_BUNDLE/] [BUNDNLE_NAME.json] [/DIRECTORY/TO/PLACE_RULES/] [SIEM] [BACKEND_OPTIONS]

For [SIEM] and [BACKEND_OPTIONS] options available, please refer to the Sigma Tools page. Note: If using multiple backend options, comma seperate. If using none, simply write "none"

Example Steps to use stix2sigmac to unpack a bundle: (Tested on Ubuntu 18.04.1 with all requirements installed)

  1. Open a terminal session
  2. Clone the repository git clone https://github.com/SecurityRiskAdvisors/TALR.git
  3. Change into the directory of the script cd /location/of/repository/Tools/stix2sigmac
  4. Give the script permission to execute chmod +x stix2sigmac
  5. Translate the rules in the command line and export to the location of your choice in sigma (additional examples can be found in the stix2sigmac readme in /Tools/) ./stix2sigmac import windows ../../Bundles/ sra_bundle.json /LOCATION/OF/EXPORT/ splunk -Orulecomment=True

Execution should look like this: TALR_run

Goals:

  • [X] Select SIEM rule sharing method (Tranlate to STIX, transport with TAXII)
  • [X] Automate ingestion of SIEM rules from a STIX bundle (stix2sigmac)
  • [X] Create sample bundles for community use
  • [ ] Develop bundling tool
  • [ ] Publish public TAXII server for community testing

Contributors:

Nick Ascoli, Zachary Santoro, Brandon Martin, Tyler Fredrick, Kevin Foster

Slides from "Keeping Up With the Joneses: SIEM Rules Edition"

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].