Skip to content

Commit

Permalink
add mappings and test case (#89)
Browse files Browse the repository at this point in the history
* dns and cloudtrail mappings

Signed-off-by: Grant Haywood <grant@phaseshift.studio>

* add s3 mappings

Signed-off-by: Grant Haywood <grant@phaseshift.studio>

Signed-off-by: Grant Haywood <grant@phaseshift.studio>
(cherry picked from commit ee7f6fb)
  • Loading branch information
phaseshiftg authored and github-actions[bot] committed Nov 9, 2022
1 parent 269d91c commit cf5a2a6
Show file tree
Hide file tree
Showing 10 changed files with 443 additions and 31 deletions.
15 changes: 9 additions & 6 deletions src/main/resources/OSMapping/cloudtrail/fieldmappings.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
# this file provides pre-defined mappings for Sigma fields defined for all Sigma rules under windows log group to their corresponding ECS Fields.
fieldmappings:
EventID: event_uid
HiveName: unmapped.HiveName
fieldB: mappedB
fieldA1: mappedA
CommandLine: windows-event_data-CommandLine
eventName: aws-cloudtrail-eventType
eventSource: aws-cloudtrail-eventSource
requestParameters.arn: aws-cloudtrail-requestParameters-arn
requestParameters.attribute: aws-cloudtrail-requestParameters-attribute
requestParameters.userName: aws-cloudtrail-requestParameters-userName
requestParameters.containerDefinitions.command: aws-cloudtrail-requestParameters-container-definitions-command
userIdentity.sessionContext.sessionIssuer.type: aws-cloudtrail-userIdentity-sessionContext-session_issuer-type
userIdentity.type: aws-cloudtrail-userIdentity-type
userIdentity.arn: aws-cloudtrail-userIdentity-type
36 changes: 32 additions & 4 deletions src/main/resources/OSMapping/cloudtrail/mappings.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,40 @@
{
"properties": {
"windows-event_data-CommandLine": {
"aws-cloudtrail-eventType": {
"type": "alias",
"path": "CommandLine"
"path": "aws.cloudtrail.eventType"
},
"event_uid": {
"aws-cloudtrail-eventSource": {
"type": "alias",
"path": "EventID"
"path": "aws.cloudtrail.eventSource"
},
"aws-cloudtrail-requestParameters-arn": {
"type": "alias",
"path": "aws.cloudtrail.requestParameters.arn"
},
"aws-cloudtrail-requestParameters-attribute": {
"type": "alias",
"path": "aws.cloudtrail.requestParameters.attribute"
},
"aws-cloudtrail-requestParameters-userName": {
"type": "alias",
"path": "aws.cloudtrail.requestParameters.userName"
},
"aws-cloudtrail-requestParameters-containerDefinitions-command": {
"type": "alias",
"path": "aws.cloudtrail.requestParameters.containerDefinitions.command"
},
"aws-cloudtrail-userIdentity-type": {
"type": "alias",
"path": "aws.cloudtrail.userIdentity.type"
},
"aws-cloudtrail-userIdentity-arn": {
"type": "alias",
"path": "aws.cloudtrail.userIdentity.arn"
},
"userIdentity-sessionContext-sessionIssuer-type": {
"type": "alias",
"path": "aws.cloudtrail.userIdentity.sessionContext.sessionIssuer.type"
}
}
}
9 changes: 3 additions & 6 deletions src/main/resources/OSMapping/dns/fieldmappings.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,4 @@
# this file provides pre-defined mappings for Sigma fields defined for all Sigma rules under windows log group to their corresponding ECS Fields.
fieldmappings:
EventID: event_uid
HiveName: unmapped.HiveName
fieldB: mappedB
fieldA1: mappedA
CommandLine: windows-event_data-CommandLine
record_type: dns-answers-type
query: dns-question-name
parent_domain: dns-question-registered_domain
14 changes: 9 additions & 5 deletions src/main/resources/OSMapping/dns/mappings.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
{
"properties": {
"windows-event_data-CommandLine": {
"dns-answers-type": {
"type": "alias",
"path": "CommandLine"
"path": "dns.answers.type"
},
"event_uid": {
"dns-question-name": {
"type": "alias",
"path": "EventID"
"path": "dns.question.name"
},
"dns-question-registered_domain": {
"type": "alias",
"path": "dns.question.registered_domain"
}
}
}
}
8 changes: 2 additions & 6 deletions src/main/resources/OSMapping/s3/fieldmappings.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,3 @@
# this file provides pre-defined mappings for Sigma fields defined for all Sigma rules under windows log group to their corresponding ECS Fields.
fieldmappings:
EventID: event_uid
HiveName: unmapped.HiveName
fieldB: mappedB
fieldA1: mappedA
CommandLine: windows-event_data-CommandLine
eventName: aws-cloudtrail-eventName
eventSource: aws-cloudtrail-eventSource
8 changes: 4 additions & 4 deletions src/main/resources/OSMapping/s3/mappings.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"properties": {
"windows-event_data-CommandLine": {
"aws-cloudtrail-eventSource": {
"type": "alias",
"path": "CommandLine"
"path": "aws.cloudtrail.eventSource"
},
"event_uid": {
"aws-cloudtrail-eventName": {
"type": "alias",
"path": "EventID"
"path": "aws.cloudtrail.eventName"
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,25 @@
import org.opensearch.client.Request;
import org.opensearch.client.Response;
import org.opensearch.client.ResponseException;
import org.opensearch.common.Strings;
import org.opensearch.common.settings.Settings;
import org.opensearch.common.xcontent.DeprecationHandler;
import org.opensearch.common.xcontent.NamedXContentRegistry;
import org.opensearch.common.xcontent.XContentFactory;
import org.opensearch.common.xcontent.XContentParser;
import org.opensearch.common.xcontent.json.JsonXContent;
import org.opensearch.securityanalytics.SecurityAnalyticsClientUtils;
import org.opensearch.securityanalytics.SecurityAnalyticsPlugin;
import org.opensearch.securityanalytics.SecurityAnalyticsRestTestCase;

import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.nio.charset.StandardCharsets;
import java.util.List;
import java.util.Map;
import java.util.stream.Collectors;

public class MapperRestApiIT extends SecurityAnalyticsRestTestCase {

Expand Down Expand Up @@ -323,4 +331,190 @@ private void createSampleIndex(String indexName) throws IOException {
assertEquals(HttpStatus.SC_OK, response.getStatusLine().getStatusCode());
}


private final String DNS_SAMPLE = "dns-sample.json";
private final String CLOUDTRAIL_SAMPLE = "cloudtrail-sample.json";
private final String CLOUDTRAIL_SAMPLE_S3 = "cloudtrail-sample-s3.json";


private final String DNS_MAPPINGS = "OSMapping/dns/mappings.json";
private final String CLOUDTRAIL_MAPPINGS = "OSMapping/cloudtrail/mappings.json";
private final String S3_MAPPINGS = "OSMapping/s3/mappings.json";

private final String NETWORK_MAPPINGS = "OSMapping/network/mappings.json";
private final String LINUX_MAPPINGS = "OSMapping/linux/mappings.json";
private final String WINDOWS_MAPPINGS = "OSMapping/windows/mappings.json";
private final String APACHE_ACCESS_MAPPINGS = "OSMapping/apache_access/mappings.json";
private final String AD_LDAP_MAPPINGS = "OSMapping/ad_ldap/mappings.json";

private String readResource(String name) throws IOException {
try (InputStream inputStream = SecurityAnalyticsPlugin.class.getClassLoader().getResourceAsStream(name)) {
if (inputStream == null) {
throw new IOException("Resource not found: " + name);
}
try (BufferedReader reader = new BufferedReader(new InputStreamReader(inputStream))) {
return reader.lines().collect(Collectors.joining("\n"));
}
}
}

public void testReadResource() throws IOException {
String content = readResource(DNS_MAPPINGS);
assertTrue(content.contains("properties"));
}

public void testCreateCloudTrailMappingS3() throws IOException {
String INDEX_NAME = "test_create_cloudtrail_s3_mapping_index";

createSampleIndex(INDEX_NAME);
// Sample dns document
String sampleDoc = readResource(CLOUDTRAIL_SAMPLE_S3);
// Index doc
Request indexRequest = new Request("POST", INDEX_NAME + "/_doc?refresh=wait_for");
indexRequest.setJsonEntity(sampleDoc);
//Generate automatic mappings my inserting doc
Response response = client().performRequest(indexRequest);
//Get the mappings being tested
String indexMapping = readResource(S3_MAPPINGS);
//Parse the mappings
XContentParser parser = JsonXContent.jsonXContent
.createParser(
NamedXContentRegistry.EMPTY,
DeprecationHandler.THROW_UNSUPPORTED_OPERATION,
indexMapping);
Map<String, Object> mappings = (Map<String, Object>) parser.map().get("properties");
GetMappingsResponse getMappingsResponse = SecurityAnalyticsClientUtils.executeGetMappingsRequest(INDEX_NAME);

MappingsTraverser mappingsTraverser = new MappingsTraverser(getMappingsResponse.getMappings().iterator().next().value);
List<String> flatProperties = mappingsTraverser.extractFlatNonAliasFields();
assertTrue(flatProperties.contains("aws.cloudtrail.eventName"));
assertTrue(flatProperties.contains("aws.cloudtrail.eventSource"));
//Loop over the mappings and run update request for each one specifying the index to be updated
mappings.entrySet().forEach(entry -> {
String key = entry.getKey();
String path = ((Map<String, Object>) entry.getValue()).get("path").toString();
try {
Request updateRequest = new Request("PUT", SecurityAnalyticsPlugin.MAPPER_BASE_URI);
updateRequest.setJsonEntity(Strings.toString(XContentFactory.jsonBuilder().map(Map.of(
"index_name", INDEX_NAME,
"field", path,
"alias", key))));
Response apiResponse = client().performRequest(updateRequest);
assertEquals(HttpStatus.SC_OK, apiResponse.getStatusLine().getStatusCode());

} catch (IOException e) {
throw new RuntimeException(e);
}
});

// Refresh everything
response = client().performRequest(new Request("POST", "_refresh"));
assertEquals(HttpStatus.SC_OK, response.getStatusLine().getStatusCode());
}

public void testCreateCloudTrailMapping() throws IOException {
String INDEX_NAME = "test_create_cloudtrail_mapping_index";

createSampleIndex(INDEX_NAME);
// Sample dns document
String sampleDoc = readResource(CLOUDTRAIL_SAMPLE);
// Index doc
Request indexRequest = new Request("POST", INDEX_NAME + "/_doc?refresh=wait_for");
indexRequest.setJsonEntity(sampleDoc);
//Generate automatic mappings my inserting doc
Response response = client().performRequest(indexRequest);
//Get the mappings being tested
String indexMapping = readResource(CLOUDTRAIL_MAPPINGS);
//Parse the mappings
XContentParser parser = JsonXContent.jsonXContent
.createParser(
NamedXContentRegistry.EMPTY,
DeprecationHandler.THROW_UNSUPPORTED_OPERATION,
indexMapping);
Map<String, Object> mappings = (Map<String, Object>) parser.map().get("properties");
GetMappingsResponse getMappingsResponse = SecurityAnalyticsClientUtils.executeGetMappingsRequest(INDEX_NAME);

MappingsTraverser mappingsTraverser = new MappingsTraverser(getMappingsResponse.getMappings().iterator().next().value);
List<String> flatProperties = mappingsTraverser.extractFlatNonAliasFields();
assertTrue(flatProperties.contains("aws.cloudtrail.eventType"));
assertTrue(flatProperties.contains("aws.cloudtrail.eventSource"));
assertTrue(flatProperties.contains("aws.cloudtrail.requestParameters.arn"));
assertTrue(flatProperties.contains("aws.cloudtrail.requestParameters.attribute"));
assertTrue(flatProperties.contains("aws.cloudtrail.requestParameters.userName"));
assertTrue(flatProperties.contains("aws.cloudtrail.userIdentity.arn"));
assertTrue(flatProperties.contains("aws.cloudtrail.userIdentity.type"));
assertTrue(flatProperties.contains("aws.cloudtrail.userIdentity.sessionContext.sessionIssuer.type"));
//Loop over the mappings and run update request for each one specifying the index to be updated
mappings.entrySet().forEach(entry -> {
String key = entry.getKey();
String path = ((Map<String, Object>) entry.getValue()).get("path").toString();
try {
Request updateRequest = new Request("PUT", SecurityAnalyticsPlugin.MAPPER_BASE_URI);
updateRequest.setJsonEntity(Strings.toString(XContentFactory.jsonBuilder().map(Map.of(
"index_name", INDEX_NAME,
"field", path,
"alias", key))));
Response apiResponse = client().performRequest(updateRequest);
assertEquals(HttpStatus.SC_OK, apiResponse.getStatusLine().getStatusCode());

} catch (IOException e) {
throw new RuntimeException(e);
}
});

// Refresh everything
response = client().performRequest(new Request("POST", "_refresh"));
assertEquals(HttpStatus.SC_OK, response.getStatusLine().getStatusCode());
}
public void testCreateDNSMapping() throws IOException{
String INDEX_NAME = "test_create_cloudtrail_mapping_index";

createSampleIndex(INDEX_NAME);
// Sample dns document
String dnsSampleDoc = readResource(DNS_SAMPLE);
// Index doc
Request indexRequest = new Request("POST", INDEX_NAME + "/_doc?refresh=wait_for");
indexRequest.setJsonEntity(dnsSampleDoc);
//Generate automatic mappings my inserting doc
Response response = client().performRequest(indexRequest);
//Get the mappings being tested
String indexMapping = readResource(DNS_MAPPINGS);
//Parse the mappings
XContentParser parser = JsonXContent.jsonXContent
.createParser(
NamedXContentRegistry.EMPTY,
DeprecationHandler.THROW_UNSUPPORTED_OPERATION,
indexMapping);
Map<String, Object> mappings = (Map<String, Object>) parser.map().get("properties");
GetMappingsResponse getMappingsResponse = SecurityAnalyticsClientUtils.executeGetMappingsRequest(INDEX_NAME);

MappingsTraverser mappingsTraverser = new MappingsTraverser(getMappingsResponse.getMappings().iterator().next().value);
List<String> flatProperties = mappingsTraverser.extractFlatNonAliasFields();
assertTrue(flatProperties.contains("dns.answers.type"));
assertTrue(flatProperties.contains("dns.question.name"));
assertTrue(flatProperties.contains("dns.question.registered_domain"));

//Loop over the mappings and run update request for each one specifying the index to be updated
mappings.entrySet().forEach(entry -> {
String key = entry.getKey();
String path = ((Map<String, Object>) entry.getValue()).get("path").toString();
try {
Request updateRequest = new Request("PUT", SecurityAnalyticsPlugin.MAPPER_BASE_URI);
updateRequest.setJsonEntity(Strings.toString(XContentFactory.jsonBuilder().map(Map.of(
"index_name", INDEX_NAME,
"field", path,
"alias", key))));
Response apiResponse = client().performRequest(updateRequest);
assertEquals(HttpStatus.SC_OK, apiResponse.getStatusLine().getStatusCode());

} catch (IOException e) {
throw new RuntimeException(e);
}
});

// Refresh everything
response = client().performRequest(new Request("POST", "_refresh"));
assertEquals(HttpStatus.SC_OK, response.getStatusLine().getStatusCode());
}

}
35 changes: 35 additions & 0 deletions src/test/resources/cloudtrail-sample-s3.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"aws": {
"cloudtrail": {
"eventVersion": "1.03",
"userIdentity": {
"type": "IAMUser",
"principalId": "111122223333",
"arn": "arn:aws:iam::111122223333:user/myUserName",
"accountId": "111122223333",
"accessKeyId": "AKIAIOSFODNN7EXAMPLE",
"userName": "myUserName"
},
"eventTime": "2019-02-01T03:18:19Z",
"eventSource": "s3.amazonaws.com",
"eventName": "ListBuckets",
"awsRegion": "us-west-2",
"sourceIPAddress": "127.0.0.1",
"userAgent": "[]",
"requestParameters": {
"host": [
"s3.us-west-2.amazonaws.com"
]
},
"responseElements": null,
"additionalEventData": {
"SignatureVersion": "SigV2",
"AuthenticationMethod": "QueryString"
},
"requestID": "47B8E8D397DCE7A6",
"eventID": "cdc4b7ed-e171-4cef-975a-ad829d4123e8",
"eventType": "AwsApiCall",
"recipientAccountId": "111122223333"
}
}
}
Loading

0 comments on commit cf5a2a6

Please sign in to comment.