-
Notifications
You must be signed in to change notification settings - Fork 489
crowdstrike: improve windows events mappings in FDR data stream #15342
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
🚀 Benchmarks reportTo see the full report comment with |
600d541
to
171497b
Compare
'1': | ||
type: change | ||
action: modification | ||
'2': |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
171497b
to
eb9d811
Compare
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This LGTM, but will wait for @w0rk3r before approving.
packages/crowdstrike/data_stream/fdr/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
💚 Build Succeeded
History
|
|
Proposed commit message
Note
For all events:
aid
tohost.id
.Registry events (
event.category
=registry
):RegCrowdstrikeKeyUpdate
RegCrowdstrikeValueUpdate
\
) in the start ofregistry.key
.crowdstrike.RegOperationType
RegOperationType 3
event.type
is set to both change and creation, should be creation onlyRegOperationType 4
event.type
is set change, but it is related to deletion, we should set it to deletion, and don’t populate the >event.type
with change by default.File events (
event.category
=file
):crowdstrike.OriginalFilename
is being mapped toprocess.pe.original_file_name
:file.pe.original_file_name
insteaduser.id
is not populatedFileOperatorSid
to populate it when presentevent.type
to creation onFileDetectInfo
events.NewExecutableRenamed
andFileRenameInfo
event.action
values:crowdstrike.TargetFileName
to populatefile.path
file.name
crowdstrike.SourceFileName
to populatefile.Ext.original.path
file.Ext.original.name
Library events (
event.category
=library
):crowdstrike.OriginalFilename
is being mapped toprocess.pe.original_file_name
:dll.pe.original_file_name
insteaddll.code_signature.trusted
is being populated withtrue
even for unsigned DLLsImageSignatureLevel 2
isENTERPRISE (0x2)
, but when I tested with an unsigned DLL it was populated with > 2. However, we can combine it withImageSignatureType
so it becomes more reliable.ImageSignatureType == 0 (NONE (0x0))
:dll.code_signature.exists
tofalse
dll.code_signature.trusted
tofalse
ImageSignatureType >= 1
andImageSignatureLevel
is0
or1
:dll.code_signature.exists
totrue
dll.code_signature.trusted
tofalse
ImageSignatureType >= 1
andImageSignatureLevel >= 2
:dll.code_signature.exists
totrue
dll.code_signature.trusted
totrue
process.pid
, I mistakenly suggested that we could useContextProcessId
to populate it, but considering other events, this > doesn’t make senseDriver events for when (
event.category
isdriver
):crowdstrike.OriginalFilename
is being mapped toprocess.pe.original_file_name
:dll.pe.original_file_name
insteadCertificatePublisher
can used to populatedll.code_signature.subject_name
ImageFileName
can used to populatedll.path
dll.name
can be extracted from theImageFileName
pathContextProcessId
can used to populateprocess.entity_id
event.action
can be set toload
SHA256HashData
can used to populatedll.hash.sha256
MD5HashData
can used to populatedll.hash.md5
ServiceDisplayName
can used to populateservice.name
Additional adjustments:
Misclassification of events as
malware
malware
fromevent.category
for the following events:AssociateIndicator
SensitiveWmiQuery
event.category
process
only, notmalware
SuspiciousCreateSymbolicLink
malware
value, keep thefile
DetectionExcluded
event.category
configuration
, notmalware
RegistryOperationDetectInfo
malware
value, keep theregistry
Overuse of
event.kind: alert
event.kind == alert
too broadly promotes many irrelevant events to security alerts, Setevent.kind
toevent
for following > events:ErrorEvent
RansomwareOpenFile
RansomwareCreateFile
ModifyServiceBinary
DetectionExcluded
SensitiveWmiQuery
FileSystemOperationDetectInfo
Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Related issues
Screenshots