Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extract potential host.domain and user.domain in Cisco Secure Endpoint #2888

Merged
merged 8 commits into from
Mar 25, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/cisco_secure_endpoint/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "2.1.0"
changes:
- description: Adding possibility to extract host and user data if possible.
type: enhancement
link: https://github.com/elastic/integrations/pull/2888
- version: "2.0.0"
changes:
- description: Update to ECS 8.0
Expand Down

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -35,9 +35,6 @@ processors:
#######################
## ECS Event Mapping ##
#######################
- set:
field: event.ingested
value: '{{_ingest.timestamp}}'
- set:
field: ecs.version
value: '8.0.0'
Expand Down Expand Up @@ -177,18 +174,50 @@ processors:
######################
## ECS Host Mapping ##
######################
- script:
lang: painless
if: 'ctx.cisco?.secure_endpoint?.computer?.hostname != null && ctx.cisco?.secure_endpoint?.computer?.hostname.contains(".")'
source: |
def domain = "";
def nameArray = ctx.cisco.secure_endpoint.computer.hostname.toString().splitOnToken(".");
if (ctx.host == null) {
ctx.host = new HashMap();
}
if (nameArray?.length > 0) {
for (int i = 1; i < nameArray.length; i++) {
domain += nameArray[i] + (i < nameArray.length - 1 ? "." : "");
}
ctx.host.hostname = nameArray[0];
P1llus marked this conversation as resolved.
Show resolved Hide resolved
ctx.host.domain = domain;
}
- script:
lang: painless
if: 'ctx.cisco?.secure_endpoint?.computer?.user != null && ctx.cisco?.secure_endpoint?.computer?.user.contains("@")'
source: >
String[] splitmail = ctx.cisco.secure_endpoint.computer.user.splitOnToken("@");
if (ctx.user == null) {
ctx.user = new HashMap();
}
if (splitmail.length != 2) {
return;
}
ctx.user.email = ctx.user.id;
ctx.user.domain = splitmail[1];
ctx.user.name = splitmail[0];
- rename:
field: cisco.secure_endpoint.computer.hostname
target_field: host.hostname
ignore_missing: true
if: ctx?.host?.hostname == null && ctx?.cisco?.secure_endpoint?.computer?.hostname != null
- set:
field: host.name
copy_from: cisco.secure_endpoint.computer.hostname
ignore_empty_value: true
- set:
field: host.hostname
copy_from: host.name
copy_from: host.hostname
ignore_empty_value: true
- rename:
field: cisco.secure_endpoint.computer.user
target_field: user.name
ignore_missing: true
if: ctx?.user?.name == null && ctx?.cisco?.secure_endpoint?.computer?.user != null

#########################
## ECS Network Mapping ##
Expand Down Expand Up @@ -552,6 +581,7 @@ processors:
- cisco.secure_endpoint.threat_hunting.techniques
- cisco.secure_endpoint.threat_hunting.tactics
- cisco.secure_endpoint.computer.hostname
- cisco.secure_endpoint.computer.user
ignore_missing: true
on_failure:
- set:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,10 @@
external: ecs
- external: ecs
name: user.name
- external: ecs
name: user.domain
- external: ecs
name: user.email
- name: related.hosts
external: ecs
- name: related.hash
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"@timestamp": "2021-01-13T10:13:08.000Z",
"agent": {
"ephemeral_id": "8228a1f2-22e9-456a-af70-07dc048a019a",
"id": "584f3aea-648c-4e58-aba4-32b8f88d4396",
"ephemeral_id": "1f61a51e-f837-493d-8813-2948b32a0ab6",
"id": "c24f19f1-2453-4481-99b2-551bd6757809",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.0.0-beta1"
"version": "8.0.0"
},
"cisco": {
"secure_endpoint": {
Expand Down Expand Up @@ -53,9 +53,9 @@
"version": "8.0.0"
},
"elastic_agent": {
"id": "584f3aea-648c-4e58-aba4-32b8f88d4396",
"id": "c24f19f1-2453-4481-99b2-551bd6757809",
"snapshot": false,
"version": "8.0.0-beta1"
"version": "8.0.0"
},
"event": {
"action": "Cloud IOC",
Expand All @@ -64,12 +64,12 @@
"file"
],
"code": "1107296274",
"created": "2022-02-02T06:03:47.554Z",
"created": "2022-03-25T08:24:30.668Z",
"dataset": "cisco_secure_endpoint.event",
"id": "1515298355162029000",
"ingested": "2022-02-02T06:03:48Z",
"ingested": "2022-03-25T08:24:31Z",
"kind": "alert",
"original": "{\"data\":{\"cloud_ioc\":{\"description\":\"Microsoft Word launched PowerShell. This is indicative of multiple dropper variants that make use of Visual Basic Application macros to perform nefarious activities, such as downloading and executing malicious executables.\",\"short_description\":\"W32.WinWord.Powershell\"},\"computer\":{\"active\":true,\"connector_guid\":\"test_connector_guid\",\"external_ip\":\"8.8.8.8\",\"hostname\":\"Demo_AMP\",\"links\":{\"computer\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer\",\"group\":\"https://api.eu.amp.cisco.com/v1/groups/test_group\",\"trajectory\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer/trajectory\"},\"network_addresses\":[{\"ip\":\"10.10.10.10\",\"mac\":\"38:1e:eb:ba:2c:15\"}]},\"connector_guid\":\"test_connector_guid\",\"date\":\"2021-01-13T10:13:08+00:00\",\"event_type\":\"Cloud IOC\",\"event_type_id\":1107296274,\"file\":{\"disposition\":\"Clean\",\"file_name\":\"PowerShell.exe\",\"file_path\":\"/C:/Windows/SysWOW64/WindowsPowerShell/v1.0/PowerShell.exe\",\"identity\":{\"sha256\":\"6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7\"},\"parent\":{\"disposition\":\"Clean\",\"identity\":{\"sha256\":\"3d46e95284f93bbb76b3b7e1bf0e1b2d51e8a9411c2b6e649112f22f92de63c2\"}}},\"group_guids\":[\"test_group_guid\"],\"id\":1515298355162029000,\"severity\":\"Medium\",\"start_date\":\"2021-01-13T10:13:08+00:00\",\"start_timestamp\":1610532788,\"timestamp\":1610532788,\"timestamp_nanoseconds\":162019000},\"metadata\":{\"links\":{\"next\":\"http://f1764cb35e0d:8080/v1/events?start_date=2022-02-01T06:03:47+00:00\\u0026limit=1\\u0026offset=1\",\"self\":\"http://f1764cb35e0d:8080/v1/events?start_date=2022-02-01T06:03:47+00:00\\u0026limit=1\"},\"results\":{\"current_item_count\":1,\"index\":0,\"items_per_page\":1,\"total\":2}},\"version\":\"v1.2.0\"}",
"original": "{\"data\":{\"cloud_ioc\":{\"description\":\"Microsoft Word launched PowerShell. This is indicative of multiple dropper variants that make use of Visual Basic Application macros to perform nefarious activities, such as downloading and executing malicious executables.\",\"short_description\":\"W32.WinWord.Powershell\"},\"computer\":{\"active\":true,\"connector_guid\":\"test_connector_guid\",\"external_ip\":\"8.8.8.8\",\"hostname\":\"Demo_AMP\",\"links\":{\"computer\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer\",\"group\":\"https://api.eu.amp.cisco.com/v1/groups/test_group\",\"trajectory\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer/trajectory\"},\"network_addresses\":[{\"ip\":\"10.10.10.10\",\"mac\":\"38:1e:eb:ba:2c:15\"}]},\"connector_guid\":\"test_connector_guid\",\"date\":\"2021-01-13T10:13:08+00:00\",\"event_type\":\"Cloud IOC\",\"event_type_id\":1107296274,\"file\":{\"disposition\":\"Clean\",\"file_name\":\"PowerShell.exe\",\"file_path\":\"/C:/Windows/SysWOW64/WindowsPowerShell/v1.0/PowerShell.exe\",\"identity\":{\"sha256\":\"6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7\"},\"parent\":{\"disposition\":\"Clean\",\"identity\":{\"sha256\":\"3d46e95284f93bbb76b3b7e1bf0e1b2d51e8a9411c2b6e649112f22f92de63c2\"}}},\"group_guids\":[\"test_group_guid\"],\"id\":1515298355162029000,\"severity\":\"Medium\",\"start_date\":\"2021-01-13T10:13:08+00:00\",\"start_timestamp\":1610532788,\"timestamp\":1610532788,\"timestamp_nanoseconds\":162019000},\"metadata\":{\"links\":{\"next\":\"http://670900e6b2c2:8080/v1/events?start_date=2022-03-24T08:24:30+00:00\\u0026limit=1\\u0026offset=1\",\"self\":\"http://670900e6b2c2:8080/v1/events?start_date=2022-03-24T08:24:30+00:00\\u0026limit=1\"},\"results\":{\"current_item_count\":1,\"index\":0,\"items_per_page\":1,\"total\":2}},\"version\":\"v1.2.0\"}",
"severity": 2,
"start": "2021-01-13T10:13:08.000Z"
},
Expand Down
18 changes: 10 additions & 8 deletions packages/cisco_secure_endpoint/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,11 +17,11 @@ An example event for `event` looks as following:
{
"@timestamp": "2021-01-13T10:13:08.000Z",
"agent": {
"ephemeral_id": "8228a1f2-22e9-456a-af70-07dc048a019a",
"id": "584f3aea-648c-4e58-aba4-32b8f88d4396",
"ephemeral_id": "1f61a51e-f837-493d-8813-2948b32a0ab6",
"id": "c24f19f1-2453-4481-99b2-551bd6757809",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.0.0-beta1"
"version": "8.0.0"
},
"cisco": {
"secure_endpoint": {
Expand Down Expand Up @@ -69,9 +69,9 @@ An example event for `event` looks as following:
"version": "8.0.0"
},
"elastic_agent": {
"id": "584f3aea-648c-4e58-aba4-32b8f88d4396",
"id": "c24f19f1-2453-4481-99b2-551bd6757809",
"snapshot": false,
"version": "8.0.0-beta1"
"version": "8.0.0"
},
"event": {
"action": "Cloud IOC",
Expand All @@ -80,12 +80,12 @@ An example event for `event` looks as following:
"file"
],
"code": "1107296274",
"created": "2022-02-02T06:03:47.554Z",
"created": "2022-03-25T08:24:30.668Z",
"dataset": "cisco_secure_endpoint.event",
"id": "1515298355162029000",
"ingested": "2022-02-02T06:03:48Z",
"ingested": "2022-03-25T08:24:31Z",
"kind": "alert",
"original": "{\"data\":{\"cloud_ioc\":{\"description\":\"Microsoft Word launched PowerShell. This is indicative of multiple dropper variants that make use of Visual Basic Application macros to perform nefarious activities, such as downloading and executing malicious executables.\",\"short_description\":\"W32.WinWord.Powershell\"},\"computer\":{\"active\":true,\"connector_guid\":\"test_connector_guid\",\"external_ip\":\"8.8.8.8\",\"hostname\":\"Demo_AMP\",\"links\":{\"computer\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer\",\"group\":\"https://api.eu.amp.cisco.com/v1/groups/test_group\",\"trajectory\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer/trajectory\"},\"network_addresses\":[{\"ip\":\"10.10.10.10\",\"mac\":\"38:1e:eb:ba:2c:15\"}]},\"connector_guid\":\"test_connector_guid\",\"date\":\"2021-01-13T10:13:08+00:00\",\"event_type\":\"Cloud IOC\",\"event_type_id\":1107296274,\"file\":{\"disposition\":\"Clean\",\"file_name\":\"PowerShell.exe\",\"file_path\":\"/C:/Windows/SysWOW64/WindowsPowerShell/v1.0/PowerShell.exe\",\"identity\":{\"sha256\":\"6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7\"},\"parent\":{\"disposition\":\"Clean\",\"identity\":{\"sha256\":\"3d46e95284f93bbb76b3b7e1bf0e1b2d51e8a9411c2b6e649112f22f92de63c2\"}}},\"group_guids\":[\"test_group_guid\"],\"id\":1515298355162029000,\"severity\":\"Medium\",\"start_date\":\"2021-01-13T10:13:08+00:00\",\"start_timestamp\":1610532788,\"timestamp\":1610532788,\"timestamp_nanoseconds\":162019000},\"metadata\":{\"links\":{\"next\":\"http://f1764cb35e0d:8080/v1/events?start_date=2022-02-01T06:03:47+00:00\\u0026limit=1\\u0026offset=1\",\"self\":\"http://f1764cb35e0d:8080/v1/events?start_date=2022-02-01T06:03:47+00:00\\u0026limit=1\"},\"results\":{\"current_item_count\":1,\"index\":0,\"items_per_page\":1,\"total\":2}},\"version\":\"v1.2.0\"}",
"original": "{\"data\":{\"cloud_ioc\":{\"description\":\"Microsoft Word launched PowerShell. This is indicative of multiple dropper variants that make use of Visual Basic Application macros to perform nefarious activities, such as downloading and executing malicious executables.\",\"short_description\":\"W32.WinWord.Powershell\"},\"computer\":{\"active\":true,\"connector_guid\":\"test_connector_guid\",\"external_ip\":\"8.8.8.8\",\"hostname\":\"Demo_AMP\",\"links\":{\"computer\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer\",\"group\":\"https://api.eu.amp.cisco.com/v1/groups/test_group\",\"trajectory\":\"https://api.eu.amp.cisco.com/v1/computers/test_computer/trajectory\"},\"network_addresses\":[{\"ip\":\"10.10.10.10\",\"mac\":\"38:1e:eb:ba:2c:15\"}]},\"connector_guid\":\"test_connector_guid\",\"date\":\"2021-01-13T10:13:08+00:00\",\"event_type\":\"Cloud IOC\",\"event_type_id\":1107296274,\"file\":{\"disposition\":\"Clean\",\"file_name\":\"PowerShell.exe\",\"file_path\":\"/C:/Windows/SysWOW64/WindowsPowerShell/v1.0/PowerShell.exe\",\"identity\":{\"sha256\":\"6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7\"},\"parent\":{\"disposition\":\"Clean\",\"identity\":{\"sha256\":\"3d46e95284f93bbb76b3b7e1bf0e1b2d51e8a9411c2b6e649112f22f92de63c2\"}}},\"group_guids\":[\"test_group_guid\"],\"id\":1515298355162029000,\"severity\":\"Medium\",\"start_date\":\"2021-01-13T10:13:08+00:00\",\"start_timestamp\":1610532788,\"timestamp\":1610532788,\"timestamp_nanoseconds\":162019000},\"metadata\":{\"links\":{\"next\":\"http://670900e6b2c2:8080/v1/events?start_date=2022-03-24T08:24:30+00:00\\u0026limit=1\\u0026offset=1\",\"self\":\"http://670900e6b2c2:8080/v1/events?start_date=2022-03-24T08:24:30+00:00\\u0026limit=1\"},\"results\":{\"current_item_count\":1,\"index\":0,\"items_per_page\":1,\"total\":2}},\"version\":\"v1.2.0\"}",
"severity": 2,
"start": "2021-01-13T10:13:08.000Z"
},
Expand Down Expand Up @@ -270,5 +270,7 @@ An example event for `event` looks as following:
| threat.technique.id | The id of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1059/) | keyword |
| threat.technique.name | The name of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1059/) | keyword |
| threat.technique.reference | The reference url of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1059/) | keyword |
| user.domain | Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. | keyword |
| user.email | User email address. | keyword |
| user.name | Short name or login of the user. | keyword |

2 changes: 1 addition & 1 deletion packages/cisco_secure_endpoint/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: 1.0.0
name: cisco_secure_endpoint
title: Cisco Secure Endpoint (AMP)
version: 2.0.0
version: 2.1.0
license: basic
description: Collect logs from Cisco Secure Endpoint (AMP) with Elastic Agent.
type: integration
Expand Down