uberAgent

Sigma Rules & Converter

uberAgent ESA ships with Threat Detection rules derived from Sigma signatures. These rules are grouped by severity: critical, high, medium, and low.

Sigma Rules

Following is an excerpt of some Sigma rules that ship with uberAgent® ESA:

  • Detect Ryuk ransomware command lines
  • Detect DNS tunnel activity for Muddywater actor
  • Detect a suspicious PowerShell command-line combination as used by APT29 in a campaign against US think tanks
  • Detect Russian group activity as described in Global Threat Report 2019 by Crowdstrike
  • Detect a suspicious DLL loading from AppData\Local as described in BlueMashroom report
  • Detect Chafer activity attributed to OilRig as reported in Nyotron report in March 2018
  • Detect CrackMapExecWin activity as described by NCSC
  • Detect Elise backdoor activity as used by APT32
  • Detect the execution of DLL side-loading malware used by threat group Emissary Panda aka APT27
  • Detect a specific tool and export used by EquationGroup
  • Detects Golden Chickens deployment method as used by Evilnum in a report published in July 2020
  • Detect tools and process executions as observed in a Greenbug campaign in May 2020
  • Detect Judgement Panda activity as described in Global Threat Report 2019 by Crowdstrike
  • Detect registry modifications performed by Ke3chang malware in campaigns running in 2019 and 2020
  • Detects Trojan loader activity as used by APT28
  • ...and hundreds more

Not all Sigma rules are enabled by default.

Sigma Converter

vast limits maintains a Sigma to uberAgent rule converter as part of the Sigma project. The converter is implemented as a Sigma backend. Please see the header of uberAgent’s Sigma rule files for instructions on how to invoke the conversion.

Sigma Rules & Converter