The Sigma rule targets unauthorized credential access or suspicious behavior on Windows systems by detecting Notepad opening files with names suggesting password storage.
The rule looks for process creation events with parent process explorer.exe, child process notepad.exe, and command line containing strings like password*.txt, password*.csv, etc.
Tagged under MITRE technique T1083 (File and Directory Discovery) and uses process_creation telemetry from Windows.
Uncoder AI automatically translates the detection logic into SentinelOne Event Query syntax, enabling efficient threat hunting or real-time alerting.
This translation includes mapping parent/child process relationships, command line pattern matching, and supports wildcards and multiple extensions.
Automatically parsing Sigma YAML-based rules, Uncoder AI maps fields and logic into SentinelOne's query structure while preserving semantic intent.
This innovation allows security teams to deploy powerful behavioral detections in SentinelOne without manual scripting.
The capability offers rapid Sigma rule reuse, detection of unauthorized credential access, reduced engineering overhead, and better visibility into file access patterns involving sensitive keywords.
Uncoder AI transforms abstract detections into actionable endpoint queries, facilitating proactive threat hunting in SentinelOne.