Skip to content

Latest commit

 

History

History
61 lines (47 loc) · 2.61 KB

README.md

File metadata and controls

61 lines (47 loc) · 2.61 KB

GitHub Workflow Status (with event) coverage GitHub tag (with filter) Documentation

Gene(sis)

A long long time ago (in 2017) after doing many responses to incidents, I realized I was always ending up doing the same thing to search inside Windows EVTX logs: writting a custom script to match log entries against our findings ! At that moment I decided to start coding this tool, not only to ease my daily work but also to be able to share detection rules between parties.

Since then, the tool has evolved and it can now be used to match against any kind of log (formatted in JSON) and has native support for Windows EVTX parsing.

Some use cases

  • Digital forensic analysis

    • early compromise information collection
    • infected host analysis
    • IOC scan on a whole network
  • (Retro)Hunt on cold storage

    • backups
    • logs forwarded
  • Combined with other tools to achieve powerful detection primitives

Additional resources

Changelog

v2.0.0

  • Code refactoring:
    • Changes in package organisation
    • Changes in API definitions
    • Implementation of an Event interface making APIs more generic
    • Default actions to apply on detections
  • Changes in the rule format:
    • New way define events to apply rule on
    • Schema field to enforce rule format compatibility with engine
    • Removed trace support (not up to date and not used)
  • Regex templates defined in TOML format

v1.6.0

  • Indirect Match Support (we can now compare two fields of the same event)
  • Containers are now case insensitive
  • New -test command line switch to create easy Gene unit testing

v1.5.0

  • Support for Mitre ATT&CK framework
  • Changes in the reducer function