Phoenix Studio
Convert indexed Sigma rules into analyst-ready detections.
This studio is built around Phoenix's own rule corpus, not a blank editor. Search by title or rule id, choose a live sigma-cli backend, then reveal pipelines only when you actually need them.
Indexed Rules
3,707
Ready to search
Backends
17
Live from sigconverter.io
CLI Versions
10
Newest: 2.0.2
Translation Workspace
Shape the rule before it leaves Phoenix
Tune Translation
Active Rule
GALLIUM IOCs
Target Profile
Splunk
Splunk SPL & tstats data model queries
Format Mode
Default
Plain SPL queries
Conversion Output
GALLIUM IOCs
Using Splunk · Default · sigma-cli 2.0.2
Translation controls
Adjust the rule on the left, then regenerate when you want a fresh backend-native query.
BackendSplunkFormatDefaultVersion2.0.2
title: GALLIUM IOCs
id: 440a56bf-7873-4439-940a-1c8a671073c2
status: test
description: Detects artifacts associated with GALLIUM cyber espionage group as reported by Microsoft Threat Intelligence Center in the December 2019 report.
references:
- https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
- https://github.com/Azure/Azure-Sentinel/blob/a02ce85c96f162de6f8cc06f07a53b6525f0ff7f/Solutions/Legacy%20IOC%20based%20Threat%20Protection/Analytic%20Rules/GalliumIOCs.yaml
author: Tim Burrell
date: 2020-02-07
modified: 2024-11-23
tags:
- attack.credential-access
- attack.command-and-control
- attack.t1212
- attack.t1071
- attack.g0093
- detection.emerging-threats
logsource:
product: windows
category: process_creation
detection:
selection:
Hashes|contains:
- 'SHA256=9ae7c4a4e1cfe9b505c3a47e66551eb1357affee65bfefb0109d02f4e97c06dd'
- 'SHA256=7772d624e1aed327abcd24ce2068063da0e31bb1d5d3bf2841fc977e198c6c5b'
- 'SHA256=657fc7e6447e0065d488a7db2caab13071e44741875044f9024ca843fe4e86b5'
- 'SHA256=2ef157a97e28574356e1d871abf75deca7d7a1ea662f38b577a06dd039dbae29'
- 'SHA256=52fd7b90d7144ac448af4008be639d4d45c252e51823f4311011af3207a5fc77'
- 'SHA256=a370e47cb97b35f1ae6590d14ada7561d22b4a73be0cb6df7e851d85054b1ac3'
- 'SHA256=5bf80b871278a29f356bd42af1e35428aead20cd90b0c7642247afcaaa95b022'
- 'SHA256=6f690ccfd54c2b02f0c3cb89c938162c10cbeee693286e809579c540b07ed883'
- 'SHA256=3c884f776fbd16597c072afd81029e8764dd57ee79d798829ca111f5e170bd8e'
- 'SHA256=1922a419f57afb351b58330ed456143cc8de8b3ebcbd236d26a219b03b3464d7'
- 'SHA256=fe0e4ef832b62d49b43433e10c47dc51072959af93963c790892efc20ec422f1'
- 'SHA256=7ce9e1c5562c8a5c93878629a47fe6071a35d604ed57a8f918f3eadf82c11a9c'
- 'SHA256=178d5ee8c04401d332af331087a80fb4e5e2937edfba7266f9be34a5029b6945'
- 'SHA256=51f70956fa8c487784fd21ab795f6ba2199b5c2d346acdeef1de0318a4c729d9'
- 'SHA256=889bca95f1a69e94aaade1e959ed0d3620531dc0fc563be9a8decf41899b4d79'
- 'SHA256=332ddaa00e2eb862742cb8d7e24ce52a5d38ffb22f6c8bd51162bd35e84d7ddf'
- 'SHA256=44bcf82fa536318622798504e8369e9dcdb32686b95fcb44579f0b4efa79df08'
- 'SHA256=63552772fdd8c947712a2cff00dfe25c7a34133716784b6d486227384f8cf3ef'
- 'SHA256=056744a3c371b5938d63c396fe094afce8fb153796a65afa5103e1bffd7ca070'
- 'SHA1=53a44c2396d15c3a03723fa5e5db54cafd527635'
- 'SHA1=9c5e496921e3bc882dc40694f1dcc3746a75db19'
- 'SHA1=aeb573accfd95758550cf30bf04f389a92922844'
- 'SHA1=79ef78a797403a4ed1a616c68e07fff868a8650a'
- 'SHA1=4f6f38b4cec35e895d91c052b1f5a83d665c2196'
- 'SHA1=1e8c2cac2e4ce7cbd33c3858eb2e24531cb8a84d'
- 'SHA1=e841a63e47361a572db9a7334af459ddca11347a'
- 'SHA1=c28f606df28a9bc8df75a4d5e5837fc5522dd34d'
- 'SHA1=2e94b305d6812a9f96e6781c888e48c7fb157b6b'
- 'SHA1=dd44133716b8a241957b912fa6a02efde3ce3025'
- 'SHA1=8793bf166cb89eb55f0593404e4e933ab605e803'
- 'SHA1=a39b57032dbb2335499a51e13470a7cd5d86b138'
- 'SHA1=41cc2b15c662bc001c0eb92f6cc222934f0beeea'
- 'SHA1=d209430d6af54792371174e70e27dd11d3def7a7'
- 'SHA1=1c6452026c56efd2c94cea7e0f671eb55515edb0'
- 'SHA1=c6b41d3afdcdcaf9f442bbe772f5da871801fd5a'
- 'SHA1=4923d460e22fbbf165bbbaba168e5a46b8157d9f'
- 'SHA1=f201504bd96e81d0d350c3a8332593ee1c9e09de'
- 'SHA1=ddd2db1127632a2a52943a2fe516a2e7d05d70d2'
condition: selection
falsepositives:
- Unknown
level: high
CLI command
Copy the exact command to reproduce this translation locally.
sigma convert --without-pipeline -t splunk -f default rules-emerging-threats/2020/TA/GALLIUM/proc_creation_win_apt_gallium_iocs.yml