https://github.com/chronicle/detection-rules
Collection of YARA-L 2.0 sample rules for the Chronicle Detection API
https://github.com/chronicle/detection-rules
Last synced: 7 months ago
JSON representation
Collection of YARA-L 2.0 sample rules for the Chronicle Detection API
- Host: GitHub
- URL: https://github.com/chronicle/detection-rules
- Owner: chronicle
- License: apache-2.0
- Created: 2021-01-19T21:30:23.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2023-12-18T23:16:09.000Z (almost 2 years ago)
- Last Synced: 2023-12-19T06:29:58.880Z (almost 2 years ago)
- Language: YARA
- Homepage: https://chronicle.security
- Size: 395 KB
- Stars: 193
- Watchers: 29
- Forks: 45
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- awesome-detection-engineering - Chronicle (GCP) Detection Rules - Chronicle's detection rules written natively for the the Chronicle Platform. (Detection Content & Signatures)
- awesome-detection-engineer - Chronicle (GCP) Rules - Detection rules written for the Chronicle Platform. (Uncategorized / Uncategorized)
- awesome-detection-engineer - Chronicle (GCP) Rules - Detection rules written for the Chronicle Platform. (Uncategorized / Uncategorized)
README
# Google Security Operations Detection Rules
This repository contains example YARA-L rules and dashboards for use within
[Google Security Operations (SecOps)](https://cloud.google.com/security/products/security-operations).The rules in this repository are distinct from Google SecOps
[Curated Detections](https://cloud.google.com/chronicle/docs/detection/curated-detections)
that are developed by Google Cloud Threat Intelligence and designed to generate
detections & alerts that are highly actionable. Curated Detections are available
to Google SecOps customers with an Enterprise license or higher.Before deploying any rules, using Google SecOps' [test rule](https://cloud.google.com/chronicle/docs/detection/manage-all-rules)
functionality is considered a best practice and provides the opportunity for
users to tune rules to their environment before creating alerts for them.Dashboard YAML files can be [imported](https://cloud.google.com/chronicle/docs/reports/import-export-dashboards#import_dashboards)
into Google SecOps dashboards using the `Add` - `Import Dashboard` capability
found next to the Personal Dashboards or Shared Dashboards section of the UI.
The intent of this is to provide sample dashboards that can serve as templates,
inspiration or starting points for your own dashboards and can be modified as
you see fit.## Directory Structure
| Directory | Description |
|--------------------------------------------- | ------------------------------ |
| [`rules/community/`](rules/community/) | YARA-L rules created by members of the Google SecOps team and user community |
| [`tools/rule_manager/`](tools/rule_manager/) | CLI tool used to manage rules and other content via Google SecOps' REST API |## Getting Started
Rules can be created within your Google SecOps instance by using the
[Rules Editor](https://cloud.google.com/chronicle/docs/detection/manage-all-rules).
Simply download the rule from the repository and copy the content of the rule
to the rules editor when creating a new rule.Detailed instructions can be found in your Google SecOps instance under
documentation.The [rule manager](tools/rule_manager/) tool and accompanying documentation &
tutorials can be used to easily implement a Detection-as-Code pipeline for
managing rules via Google SecOps' [REST API](https://cloud.google.com/chronicle/docs/reference/rest).## How to Get Help
If you have questions related to this project, please open a new issue in this
GitHub repository. You can also ask questions related to Google SecOps in the
[Google Cloud Security Community](https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security).## How to Contribute
Interested in contributing to this project? We'd love to hear from you! Example
contributions include new rules and updates to existing rules.Please refer to our [contribution guide](CONTRIBUTING.md) for further
information.Our style guide for authoring YARA-L detection rules can be found [here](STYLE_GUIDE.md).
## Useful Resources
### YARA-L rules and Unified Data Model (UDM)
* [Monitoring events using rules](https://cloud.google.com/chronicle/docs/how-to#monitoring-events-using-rules)
* [Overview of the YARA-L language](https://cloud.google.com/chronicle/docs/detection/yara-l-2-0-overview)
* [YARA-L language syntax](https://cloud.google.com/chronicle/docs/detection/yara-l-2-0-syntax)
* [Unified Data Model usage guide](https://cloud.google.com/chronicle/docs/unified-data-model/udm-usage)
* [Unified Data Model field list](https://cloud.google.com/chronicle/docs/reference/udm-field-list)### Code Samples
* [Example Code for interacting with Google SecOps' API](https://github.com/chronicle/api-samples-python/tree/master/detect/v1alpha)