Uncoder.io

Uncoder.io

One-liner: An online platform that translates detection rules and IOC lists between different SIEM, EDR, and XDR query formats.

🎯 What Is It?

Uncoder.io is a free web-based tool developed by SOC Prime that converts security detection content between different formats. It supports translation of:

This enables security teams to reuse detection logic across different security platforms without manually rewriting queries.

🤔 Why It Matters

🔬 How It Works

Supported Conversions

Source Formats (Input)

Target Formats (Output)

IOC Translation Example

Input: IOC List (IPs)

192.168.1.100
10.0.0.50
172.16.5.20

Output: Elastic KQL

destination.ip:(192.168.1.100 OR 10.0.0.50 OR 172.16.5.20)

Output: Splunk SPL

dest_ip IN ("192.168.1.100", "10.0.0.50", "172.16.5.20")

Sigma Translation Example

Input: Sigma Rule

title: Suspicious PowerShell Execution
logsource:
  product: windows
detection:
  selection:
    CommandLine|contains: 
      - 'Invoke-Mimikatz'
      - '-EncodedCommand'
  condition: selection

Output: Elastic KQL

process.command_line:(*Invoke-Mimikatz* OR *-EncodedCommand*)

Output: ElastAlert Rule

filter:
- query_string:
    query: 'process.command_line:(*Invoke-Mimikatz* OR *-EncodedCommand*)'

🛠️ Practical Use Cases

1. Threat intelligence IOC Hunting

Scenario: Receive IOC list from threat intel feed
Steps:

  1. Paste IPs/domains into Uncoder.io
  2. Select "IOCs" as source
  3. Select target platform (e.g., Elastic Query)
  4. Copy generated query
  5. Execute in Kibana to hunt for IOCs

2. Sigma Rule Deployment

Scenario: Found community Sigma rule for Malware detection
Steps:

  1. Copy Sigma rule YAML
  2. Paste into Uncoder.io
  3. Select "Sigma" → "ElastAlert"
  4. Deploy generated ElastAlert rule
  5. Start alerting on technique

3. SIEM Migration

Scenario: Migrating from Splunk to Elastic
Steps:

  1. Export Splunk detection rules
  2. Convert each rule via Uncoder.io
  3. Review/tune generated Elastic queries
  4. Deploy in new Elastic environment

🎤 Interview Angles

Common Questions

Key Talking Points

STAR Story

Situation: Received threat intel report with 15 malicious IPs related to Ransomware campaign. Needed to hunt for them in Elasticsearch logs immediately.
Task: Convert IOC list to Elastic query for threat hunting.
Action: Used Uncoder.io to paste IOC list, selected "IOCs" as source and "Elastic Query" as target. Tool automatically defanged IPs and generated KQL query. Ran query in Kibana against filebeat-* index for past 30 days.
Result: Identified 48 connections to 7 of the malicious IPs from a compromised host. Isolated host, blocked IPs at firewall, prevented ransomware deployment. Total time from intel to detection: 5 minutes.

✅ Best Practices

❌ Common Misconceptions

🆚 Comparison with Similar Tools

Tool Type Formats Cost
Uncoder.io Web-based converter 50+ formats Free (account required)
sigmac CLI tool 20+ formats Free (deprecated)
pySigma Python library Extensible Free
Sentinel Converter Microsoft tool KQL only Free

📚 References