Open-Source Language for Collective Cyber Defense
with the background in 100+ SIEM deployment
and improvement projects, having built
over 300 log data connectors for leading
vendors
language: splunk
schema: cim
body: index=* ((((process="*comsvcs*") AND
(process="*MiniDump*")) OR ((process="*comsvcs*") AND
(process="*#24*"))) OR ((process="*comsvcs*") AND
(process="*full*")))
2022-04-01 - 2022-08-08: Bumblebee
2022-07-27: KNOTWEED
2022-12-04: UAC-0082, CERT-UA#4435
mitre-attack: t1003.001
tags: Bumblebee, UAC-0082, CERT-UA#4435, KNOTWEED,
Comsvcs, cir_ttps, ContentlistEndpoint
Roots of RootA
Community Collaboration
Enabling Cross-Platform Query Translation
A Journey Beyond Detection
RootA syntax fully accommodates OCSF and Sigma rules as taxonomy, making it fast to learn, easy to read and share, providing maximum compatibility for Detection Engineers.
Enabled for Defence, with Open-Source Uncoder IO
- RootA
- Sigma
- IOCs
Supported Technologies
Speak 65 languages for 45 technologies, with RootA acting as a wrapper for any SIEM, EDR, XDR, or Data Lake format.
Sigma
Have questions?
Splunk
Have questions?
Elastic Stack
Have questions?
ElastAlert
Have questions?
Microsoft Sentinel
Have questions?
Defender ATP
Have questions?
Humio
Have questions?
Carbon Black
Have questions?
QRadar
Have questions?
Google Chronicle
Have questions?
CrowdStrike
Have questions?
Carbon Black
Have questions?
Sumo Logic
Have questions?
Securonix
Have questions?
LimaCharlie
Have questions?
FireEye Helix
Have questions?
SentinelOne
Have questions?
PowerShell
Have questions?
Qualys
Have questions?
Kafka
Have questions?
Sysmon
Have questions?
RSA NetWitness
Have questions?
LogPoint
Have questions?
Graylog
Have questions?
other languages for technologies
Have questions?
Deeper into the Roots
RootA is made to be easy to start with for a person with any background. Experiment with packaging open-source rule formats like Sigma or Yara. Use knowledge you have on any specific SIEM language to create RootA rules which become instantly compatible with all the languages that exist.
RootA structure supports adding valuable information based on your expertise. This can be as simple as providing an extended description and reference, more advanced like logging requirements or MITRE ATT&CK tag. Experts will find it easy to share log audit requirements as well as Threat Actor and Campaign timelines.
Join the RootA Community
Whether you’re a seasoned expert or just learning how to write detection code, you're welcome to join the ranks of our RootA community. Connect to peers and contribute to collective cyber defense for a secure tomorrow.