omega-rules
v0.3.1
Published
SIEM rules for JS objects
Downloads
5
Readme
A SIEM detection format for JavaScript objects.
The pattern matching and rule syntax are based on Sigma rules, but adapted for the analysis of javscript objects rather than logfiles.
Why should I use this?
You probably shouldn't.
- The entire rule engine is written in TypeScript and the evaluation is very much not optimized for use at massive scale.
- This is a proof of concept for my personal use and to increase my understanding of detection flows.
However, if you are intersted in evaluating arbitrary objects against something closely resembling sigma rules, feel free to give it a shot!
- Writing detection logic is simple, yet quite powerful!
- Rules can have rich meta data, so you know what is matched and why!
- Integreation is approachable, you should be able to get this working pretty quickly!
Contributing
Before contributing, please read through the wiki. It details almost anything there is to know. If the wiki is not specific enough, check out the Sigma rule specification, Omega is very much built around it!
Before submitting a PR, please make sure:
- The project builds
yarn build
. - The tests run without fail
yarn test
. - The format and lint rule are applied and respected
yarn lint
,yarn format
Inspiration and simialar projects
This project closely follows the sigma rule specification and was inspired by seeing these amazing projects in action:
- https://github.com/SigmaHQ/sigma (log files)
- https://github.com/VirusTotal/yara (malware)
- https://www.snort.org/ (network traffic)
- https://github.com/phish-report/IOK (phishing kits)