
How It Works
This feature enables detection engineers to seamlessly convert Sigma rules into Google SecOps Query Language (UDM). In the screenshot, the original Sigma rule is designed to detect DNS queries to known Katz Stealer domains — a malware family associated with data exfiltration and command-and-control activity.
Left Panel – Sigma Rule:
The Sigma logic includes:
- DNS category logsource
- Detection conditions matching four known domains tied to Katz Stealer (
katz-panel.com
,katzstealer.com
, etc.) - A high severity level, indicating likely malicious behavior
Right Panel – Google SecOps Output:
Uncoder AI auto-generates an equivalent UDM query, translating the Sigma detection logic into platform-specific syntax:
{target.url=/.*katz-panel.com.*/ nocase or ...}
This pattern uses regex matching with nocase modifiers across the identified domains, adapted for Google’s UDM schema. The transformation ensures the original detection intent is preserved with syntax that’s immediately usable in Google SecOps.
Why It’s Innovative
Traditionally, detection content must be rewritten manually for each SIEM/XDR platform — a tedious and error-prone process, especially when handling DNS observables and regular expressions.
Uncoder AI solves this by:
- Automatically mapping Sigma fields to UDM field names (e.g.,
query|contains
→target.url
) - Adapting matching logic with correct regex structures and casing rules
- Ensuring fidelity of detection coverage across platforms
This allows threat detection to scale rapidly without vendor-specific coding effort.
Operational Value
For SOC teams and detection engineers:
- Time savings: Convert reusable Sigma detections into UDM syntax instantly.
- Threat coverage: Deploy DNS-based detections for Katz Stealer across cloud-native Google environments.
- Precision and consistency: Ensure translation accuracy while maintaining detection logic integrity.
- Platform extensibility: Build detections once, operationalize everywhere.
This feature allows security teams to turn open-source detection content into actionable UDM queries — reducing response time and enhancing visibility across Google SecOps deployments.
The post Detect DNS Threats in Google SecOps: Katz Stealer Rule Conversion with Uncoder AI appeared first on SOC Prime.