Awesome
<div align="center"><img src="assets/logo.svg" width="300"/></div>Gene(sis)
A long long time ago (in 2017) after doing many responses to incidents, I realized I was always ending up doing the same thing to search inside Windows EVTX logs: writting a custom script to match log entries against our findings ! At that moment I decided to start coding this tool, not only to ease my daily work but also to be able to share detection rules between parties.
Since then, the tool has evolved and it can now be used to match against any kind of log (formatted in JSON) and has native support for Windows EVTX parsing.
Some use cases
-
Digital forensic analysis
- early compromise information collection
- infected host analysis
- IOC scan on a whole network
-
(Retro)Hunt on cold storage
- backups
- logs forwarded
-
Combined with other tools to achieve powerful detection primitives
Additional resources
- To convert old rules (prior to 2.0.0 schema) to the new format, use migraterule.py
- Where to find rules ?
Changelog
v2.0.0
- Code refactoring:
- Changes in package organisation
- Changes in API definitions
- Implementation of an Event interface making APIs more generic
- Default actions to apply on detections
- Changes in the rule format:
- New way define events to apply rule on
- Schema field to enforce rule format compatibility with engine
- Removed trace support (not up to date and not used)
- Regex templates defined in TOML format
v1.6.0
- Indirect Match Support (we can now compare two fields of the same event)
- Containers are now case insensitive
- New
-test
command line switch to create easy Gene unit testing
v1.5.0
- Support for Mitre ATT&CK framework
- Changes in the reducer function