An open API service indexing awesome lists of open source software.

https://github.com/0xrawsec/gene

Signature engine for all your logs
https://github.com/0xrawsec/gene

detection-engineering dfir threat-hunting

Last synced: 4 months ago
JSON representation

Signature engine for all your logs

Awesome Lists containing this project

README

        

[![GitHub Workflow Status (with event)](https://img.shields.io/github/actions/workflow/status/0xrawsec/gene/go.yml?style=for-the-badge)](https://github.com/0xrawsec/gene/actions/workflows/go.yml)
[![coverage](https://raw.githubusercontent.com/0xrawsec/gene/coverage/.github/coverage/badge.svg)](https://github.com/0xrawsec/gene/blob/coverage/.github/coverage/coverage.txt)
![GitHub tag (with filter)](https://img.shields.io/github/v/tag/0xrawsec/gene?style=for-the-badge&label=version&color=orange)
[![Documentation](https://img.shields.io/badge/docs-latest-blue.svg?style=for-the-badge&logo=docsdotrs)][doc-link]

[doc-link]: https://rawsec.lu/doc/gene/2.0/

# Gene(sis)

A long long time ago (in 2017) after doing many responses to incidents, I realized
I was always ending up doing the same thing to search inside Windows EVTX logs:
writting a custom script to match log entries against our findings ! At that moment I
decided to start coding this tool, not only to ease my daily work but also to be able
to share detection rules between parties.

Since then, the tool has evolved and it can now be used to match against
any kind of log (formatted in JSON) and has native support for Windows EVTX parsing.

# Some use cases

* Digital forensic analysis
* early compromise information collection
* infected host analysis
* IOC scan on a whole network

* (Retro)Hunt on cold storage
* backups
* logs forwarded

* Combined with other tools to achieve powerful detection primitives
* [Microsoft Sysmon](https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon)
* [Kunai](https://github.com/0xrawsec/kunai)

# Additional resources
* To convert old rules (prior to 2.0.0 schema) to the new format, use [migraterule.py](./scripts/migraterule.py)
* [Where to find rules ?](https://github.com/0xrawsec/gene-rules)

# Changelog

## v2.0.0
* Code refactoring:
* Changes in package organisation
* Changes in API definitions
* Implementation of an Event interface making APIs more generic
* Default actions to apply on detections
* Changes in the rule format:
* New way define events to apply rule on
* Schema field to enforce rule format compatibility with engine
* Removed trace support (not up to date and not used)
* Regex templates defined in **TOML** format

## v1.6.0
* Indirect Match Support (we can now compare two fields of the same event)
* Containers are now case insensitive
* New `-test` command line switch to create easy Gene unit testing

## v1.5.0
* Support for Mitre ATT&CK framework
* Changes in the reducer function