Skip to content

SharmilaMS-Hcl/test1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

33 Commits
 
 
 
 

Repository files navigation

Crowdstrike Logscale

Supported STIX Mappings

See the table of mappings for the STIX objects and operators supported by this connector.

Table of Contents

Crowdstrike Logscale API Endpoints

Connector Method Crowdstrike Logscale API Endpoint Method
Ping Endpoint Status API - api/v1/status GET
Results Endpoint Search API - api/v1/repositories POST

Format for calling stix-shifter from the command line

python main.py `<translator_module>` `<query or result>` `<STIX identity object>` `<data>`

Pattern expression with STIX and CUSTOM attributes

Single Observation

STIX Translate query

translate crowdstrike_logscale query "{}" "[process:name IN ('cmd.exe','calc.exe') AND x-oca-asset:hostname LIKE 'EC2' OR ipv4-addr:value ISSUBSET '1.1.1.1/32'] START t'2023-12-15T00:00:00.000Z' STOP t'2023-12-22T00:00:00.000Z'"

STIX Translate query - Output

{
    "queries": [
        {
            "source": "crowdstrike_edr",
            "queryString": "device.local_ip =~ cidr(subnet=\"1.1.1.1/32\") | tail(10000)",
            "start": 1702598400000,
            "end": 1703203200000
        },
        {
            "source": "crowdstrike_edr",
            "queryString": "device.external_ip =~ cidr(subnet=\"1.1.1.1/32\") | tail(10000)",
            "start": 1702598400000,
            "end": 1703203200000
        },
        {
            "source": "crowdstrike_edr",
            "queryString": "(device.hostname = /EC2/i and @rawstring = /\"behaviors\"\\s*:\\s*\\[.*\"filename\"\\s*:\\s*(\"cmd\\.exe\"|\"calc\\.exe\")/) | tail(10000)",
            "start": 1702598400000,
            "end": 1703203200000
        }
    ]
}

STIX Transmit results - Query

transmit
crowdstrike_logscale
"{\"host\":\"xxx\"}"
"{\"auth\":{\"repository\":\"TestRepository\",\"api_token\": \"123\"}}"
results
"{ \"source\": \"crowdstrike_edr\", \"queryString\": \"device.local_ip =~ cidr(subnet=\\"1.1.1.1/32\\") | tail(10000)\", \"start\": 1702598400000, \"end\": 1703203200000 }"
0
1

STIX Transmit results - Output

{
  "success": true,
  "data": [
    {
      "crowdstrike_edr": {
        "@timestamp": 1703137747000,
        "@timestamp.nanos": "0",
        "#repo": "TestRepository",
        "#type": "CrowdStrike_Spotlight",
        "@id": "2WHBHU5SGtAkborKxZbfdFiV_0_1_1703137747",
        "@ingesttimestamp": "1703156586706",
        "@rawstring": "{\"cid\": \"ef2175xxyyzz440d\", \"created_timestamp\": \"2023-12-21T05:48:35.582580046Z\", \"detection_id\": \"ldt:7xyz:180393699382\", \"device\": {\"device_id\": \"7xyz\", \"cid\": \"ef2175xxyyzz440d\", \"agent_load_flags\": \"1\", \"agent_local_time\": \"2023-12-21T05:47:27.598Z\", \"agent_version\": \"7.05.17706.0\", \"bios_manufacturer\": \"Xen\", \"bios_version\": \"4.11.amazon\", \"config_id_base\": \"65994763\", \"config_id_build\": \"17706\", \"config_id_platform\": \"3\", \"external_ip\": \"1.2.3.4\", \"hostname\": \"EC2123\", \"first_seen\": \"2023-05-16T05:10:55Z\", \"last_login_timestamp\": \"2023-12-20T05:54:17Z\", \"last_login_user\": \"Administrator\", \"last_seen\": \"2023-12-21T05:47:37Z\", \"local_ip\": \"2.2.2.2\", \"mac_address\": \"12-34-56-78-6b-9b\", \"major_version\": \"10\", \"minor_version\": \"0\", \"os_version\": \"Windows Server 2022\", \"platform_id\": \"0\", \"platform_name\": \"Windows\", \"product_type\": \"3\", \"product_type_desc\": \"Server\", \"status\": \"normal\", \"system_manufacturer\": \"Xen\", \"system_product_name\": \"HVM domU\", \"groups\": [\"97350feebe4541e8a615c0d3f18acdf3\", \"bb1e1190b46348e69e10785030e8b23d\"], \"modified_timestamp\": \"2023-12-21T05:47:38Z\", \"instance_id\": \"i-0123\", \"service_provider\": \"AWS_EC2_V2\", \"service_provider_account_id\": \"12345678\"}, \"behaviors\": [{\"device_id\": \"7xyz\", \"timestamp\": \"2023-12-21T05:48:28Z\", \"template_instance_id\": \"3\", \"behavior_id\": \"41002\", \"filename\": \"cmd.exe\", \"filepath\": \"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\cmd.exe\", \"alleged_filetype\": \"exe\", \"cmdline\": \"C:\\\\Windows\\\\system32\\\\cmd.exe /c C:\\\\Windows\\\\system32\\\\reg.exe query hklm\\\\software\\\\microsoft\\\\windows\\\\softwareinventorylogging /v collectionstate /reg:64\", \"scenario\": \"suspicious_activity\", \"objective\": \"Falcon Detection Method\", \"tactic\": \"Custom Intelligence\", \"tactic_id\": \"CSTA0005\", \"technique\": \"Indicator of Attack\", \"technique_id\": \"CST0004\", \"display_name\": \"CustomIOAWinMedium\", \"description\": \"A process triggered a medium severity custom rule.\", \"severity\": 50, \"confidence\": 100, \"ioc_type\": \"hash_sha256\", \"ioc_value\": \"eb71xxxxx08\", \"ioc_source\": \"library_load\", \"ioc_description\": \"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\cmd.exe\", \"user_name\": \"EC2AMAZ-CROWDST$\", \"user_id\": \"S-1-5-18\", \"control_graph_id\": \"ctg:7xyz:180393699382\", \"triggering_process_graph_id\": \"pid:7xyz:184878679367\", \"sha256\": \"eb71xxxxx08\", \"md5\": \"e7a6babc90f4\", \"parent_details\": {\"parent_sha256\": \"eb71xxxxx08\", \"parent_md5\": \"e7a6babc90f4\", \"parent_cmdline\": \"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" /d /c C:\\\\Windows\\\\system32\\\\silcollector.cmd configure\", \"parent_process_graph_id\": \"pid:7xyz:184873610105\"}, \"pattern_disposition\": 2048, \"pattern_disposition_details\": {\"indicator\": false, \"detect\": false, \"inddet_mask\": false, \"sensor_only\": false, \"rooting\": false, \"kill_process\": false, \"kill_subprocess\": false, \"quarantine_machine\": false, \"quarantine_file\": false, \"policy_disabled\": false, \"kill_parent\": false, \"operation_blocked\": false, \"process_blocked\": true, \"registry_operation_blocked\": false, \"critical_process_disabled\": false, \"bootup_safeguard_enabled\": false, \"fs_operation_blocked\": false, \"handle_operation_downgraded\": false, \"kill_action_failed\": false, \"blocking_unsupported_or_disabled\": false, \"suspend_process\": false, \"suspend_parent\": false}, \"rule_instance_id\": \"3\", \"rule_instance_version\": 3}], \"email_sent\": false, \"first_behavior\": \"2023-12-21T05:48:28Z\", \"last_behavior\": \"2023-12-21T05:48:28Z\", \"max_confidence\": 100, \"max_severity\": 50, \"max_severity_displayname\": \"Medium\", \"show_in_ui\": true, \"status\": \"new\", \"hostinfo\": {\"domain\": \"\"}, \"seconds_to_triaged\": 0, \"seconds_to_resolved\": 0, \"behaviors_processed\": [\"pid:7xyz:184878679367:41002\"], \"date_updated\": \"2023-12-21T05:49:07Z\"}",
        "@timezone": "Z",
        "behaviors": [
          {
            "alleged_filetype": "exe",
            "behavior_id": "41002",
            "cmdline": "C:\\Windows\\system32\\cmd.exe /c C:\\Windows\\system32\\reg.exe query hklm\\software\\microsoft\\windows\\softwareinventorylogging /v collectionstate /reg:64",
            "confidence": "100",
            "control_graph_id": "ctg:7xyz:180393699382",
            "description": "A process triggered a medium severity custom rule.",
            "device_id": "7xyz",
            "display_name": "CustomIOAWinMedium",
            "filename": "cmd.exe",
            "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\cmd.exe",
            "ioc_description": "\\Device\\HarddiskVolume1\\Windows\\System32\\cmd.exe",
            "ioc_source": "library_load",
            "ioc_type": "hash_sha256",
            "ioc_value": "eb71xxxxx08",
            "md5": "e7a6babc90f4",
            "objective": "Falcon Detection Method",
            "parent_details": {
              "parent_cmdline": "\"C:\\Windows\\system32\\cmd.exe\" /d /c C:\\Windows\\system32\\silcollector.cmd configure",
              "parent_md5": "e7a6babc90f4",
              "parent_process_graph_id": "pid:7xyz:184873610105",
              "parent_sha256": "eb71xxxxx08"
            },
            "pattern_disposition": "2048",
            "pattern_disposition_details": {
              "blocking_unsupported_or_disabled": "false",
              "bootup_safeguard_enabled": "false",
              "critical_process_disabled": "false",
              "detect": "false",
              "fs_operation_blocked": "false",
              "handle_operation_downgraded": "false",
              "inddet_mask": "false",
              "indicator": "false",
              "kill_action_failed": "false",
              "kill_parent": "false",
              "kill_process": "false",
              "kill_subprocess": "false",
              "operation_blocked": "false",
              "policy_disabled": "false",
              "process_blocked": "true",
              "quarantine_file": "false",
              "quarantine_machine": "false",
              "registry_operation_blocked": "false",
              "rooting": "false",
              "sensor_only": "false",
              "suspend_parent": "false",
              "suspend_process": "false"
            },
            "rule_instance_id": "3",
            "rule_instance_version": "3",
            "scenario": "suspicious_activity",
            "severity": "50",
            "sha256": "eb71xxxxx08",
            "tactic": "Custom Intelligence",
            "tactic_id": "CSTA0005",
            "technique": "Indicator of Attack",
            "technique_id": "CST0004",
            "template_instance_id": "3",
            "timestamp": "2023-12-21T05:48:28Z",
            "triggering_process_graph_id": "pid:7xyz:184878679367",
            "user_id": "S-1-5-18",
            "user_name": "EC2123"
          }
        ],
        "behaviors_processed": [
          "pid:7xyz:184878679367:41002"
        ],
        "cid": "ef2175xxyyzz440d",
        "created_timestamp": "2023-12-21T05:48:35.582580046Z",
        "date_updated": "2023-12-21T05:49:07Z",
        "detection_id": "ldt:7xyz:180393699382",
        "device": {
          "agent_load_flags": "1",
          "agent_local_time": "2023-12-21T05:47:27.598Z",
          "agent_version": "7.05.17706.0",
          "bios_manufacturer": "Xen",
          "bios_version": "4.11.amazon",
          "cid": "ef2175xxyyzz440d",
          "config_id_base": "65994763",
          "config_id_build": "17706",
          "config_id_platform": "3",
          "device_id": "7xyz",
          "external_ip": "1.2.3.4",
          "first_seen": "2023-05-16T05:10:55Z",
          "groups": [
            "97350feebe4541e8a615c0d3f18acdf3",
            "bb1e1190b46348e69e10785030e8b23d"
          ],
          "hostname": "EC2123",
          "instance_id": "i-0123",
          "last_login_timestamp": "2023-12-20T05:54:17Z",
          "last_login_user": "Administrator",
          "last_seen": "2023-12-21T05:47:37Z",
          "local_ip": "1.1.1.1",
          "mac_address": "12-34-56-78-6b-9b",
          "major_version": "10",
          "minor_version": "0",
          "modified_timestamp": "2023-12-21T05:47:38Z",
          "os_version": "Windows Server 2022",
          "platform_id": "0",
          "platform_name": "Windows",
          "product_type": "3",
          "product_type_desc": "Server",
          "service_provider": "AWS_EC2_V2",
          "service_provider_account_id": "12345678",
          "status": "normal",
          "system_manufacturer": "Xen",
          "system_product_name": "HVM domU"
        },
        "email_sent": "false",
        "first_behavior": "2023-12-21T05:48:28Z",
        "hostinfo": {
          "domain": ""
        },
        "last_behavior": "2023-12-21T05:48:28Z",
        "max_confidence": "100",
        "max_severity": "50",
        "max_severity_displayname": "Medium",
        "seconds_to_resolved": "0",
        "seconds_to_triaged": "0",
        "show_in_ui": "true",
        "status": "new",
        "finding_type": "alert"
      }
    }
  ]
}

STIX Translate results

{
    "type": "bundle",
    "id": "bundle--2aaa88a7-013f-4b65-9fff-d44a9c9a6c6a",
    "objects": [
        {
            "type": "identity",
            "id": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
            "name": "crowdstrike_logscale",
            "identity_class": "events",
            "created": "2022-01-22T13:22:50.336Z",
            "modified": "2023-04-22T13:22:50.336Z"
        },
        {
            "id": "observed-data--9156fe87-a216-4cef-84a1-31bf8a9cde73",
            "type": "observed-data",
            "created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
            "created": "2023-12-25T05:40:47.449Z",
            "modified": "2023-12-25T05:40:47.449Z",
            "objects": {
                "0": {
                    "type": "file",
                    "x_extension": "exe",
                    "name": "cmd.exe",
                    "x_path": "\\Device\\HarddiskVolume1\\Windows\\System32\\cmd.exe",
                    "parent_directory_ref": "3",
                    "hashes": {
                        "MD5": "e7a6babc90f4",
                        "SHA-256": "eb71xxxxx08"
                    }
                },
                "1": {
                    "type": "x-crowdstrike-detection-behavior",
                    "behavior_id": "41002",
                    "confidence": 100,
                    "control_graph_id": "ctg:7xyz:180393699382",
                    "description": "A process triggered a medium severity custom rule.",
                    "name": "CustomIOAWinMedium",
                    "process_ref": "2",
                    "ioc_description": "\\Device\\HarddiskVolume1\\Windows\\System32\\cmd.exe",
                    "ioc_source": "library_load",
                    "ioc_type": "hash_sha256",
                    "ioc_value": "eb71xxxxx08",
                    "objective": "Falcon Detection Method",
                    "pattern_disposition": 2048,
                    "pattern_disposition_details": {
                        "blocking_unsupported_or_disabled": "false",
                        "bootup_safeguard_enabled": "false",
                        "critical_process_disabled": "false",
                        "detect": "false",
                        "fs_operation_blocked": "false",
                        "handle_operation_downgraded": "false",
                        "inddet_mask": "false",
                        "indicator": "false",
                        "kill_action_failed": "false",
                        "kill_parent": "false",
                        "kill_process": "false",
                        "kill_subprocess": "false",
                        "operation_blocked": "false",
                        "policy_disabled": "false",
                        "process_blocked": "true",
                        "quarantine_file": "false",
                        "quarantine_machine": "false",
                        "registry_operation_blocked": "false",
                        "rooting": "false",
                        "sensor_only": "false",
                        "suspend_parent": "false",
                        "suspend_process": "false"
                    },
                    "rule_instance_id": 3,
                    "rule_instance_version": "3",
                    "scenario": "suspicious_activity",
                    "severity": 50,
                    "ttp_tagging_ref": "6",
                    "template_instance_id": "3",
                    "created_time": "2023-12-21T05:48:28Z",
                    "user_ref": "7"
                },
                "2": {
                    "type": "process",
                    "command_line": "C:\\Windows\\system32\\cmd.exe /c C:\\Windows\\system32\\reg.exe query hklm\\software\\microsoft\\windows\\softwareinventorylogging /v collectionstate /reg:64",
                    "name": "cmd.exe",
                    "binary_ref": "0",
                    "parent_ref": "4",
                    "x_process_graph_id": "pid:7xyz:184878679367",
                    "creator_user_ref": "7"
                },
                "3": {
                    "type": "directory",
                    "path": "\\Device\\HarddiskVolume1\\Windows\\System32"
                },
                "4": {
                    "type": "process",
                    "command_line": "\"C:\\Windows\\system32\\cmd.exe\" /d /c C:\\Windows\\system32\\silcollector.cmd configure",
                    "binary_ref": "5",
                    "x_process_graph_id": "pid:7xyz:184873610105"
                },
                "5": {
                    "type": "file",
                    "hashes": {
                        "MD5": "e7a6babc90f4",
                        "SHA-256": "eb71xxxxx08"
                    }
                },
                "6": {
                    "type": "x-ibm-ttp-tagging",
                    "name": "Custom Intelligence",
                    "extensions": {
                        "mitre-attack-ext": {
                            "tactic_id": "CSTA0005",
                            "technique_name": "Indicator of Attack",
                            "technique_id": "CST0004"
                        }
                    }
                },
                "7": {
                    "type": "user-account",
                    "user_id": "S-1-5-18",
                    "display_name": "EC2123"
                },
                "8": {
                    "type": "x-ibm-finding",
                    "x_behavior_refs": [
                        "1"
                    ],
                    "ttp_tagging_refs": [
                        "6"
                    ],
                    "x_behaviors_processed": [
                        "pid:7xyz:184878679367:41002"
                    ],
                    "time_observed": "2023-12-21T05:48:35.582Z",
                    "x_last_updated": "2023-12-21T05:49:07Z",
                    "name": "ldt:7xyz:180393699382",
                    "src_ip_ref": "11",
                    "src_os_ref": "14",
                    "x_is_email_sent": "false",
                    "x_first_behavior_observed": "2023-12-21T05:48:28Z",
                    "x_last_behavior_observed": "2023-12-21T05:48:28Z",
                    "confidence": 100,
                    "severity": 50,
                    "x_severity_name": "Medium",
                    "x_seconds_to_resolved": "0",
                    "x_seconds_to_triaged": "0",
                    "x_status": "new",
                    "finding_type": "alert"
                },
                "9": {
                    "type": "x-oca-asset",
                    "x_cid": "ef2175xxyyzz440d",
                    "x_agent_ref": "10",
                    "x_bios_manufacturer": "Xen",
                    "x_bios_version": "4.11.amazon",
                    "device_id": "7xyz",
                    "ip_refs": [
                        "11",
                        "12"
                    ],
                    "x_first_seen": "2023-05-16T05:10:55Z",
                    "x_device_groups": [
                        "97350feebe4541e8a615c0d3f18acdf3",
                        "bb1e1190b46348e69e10785030e8b23d"
                    ],
                    "hostname": "EC2123",
                    "x_instance_id": "i-0123",
                    "x_last_seen": "2023-12-21T05:47:37Z",
                    "mac_refs": [
                        "13"
                    ],
                    "x_last_modified": "2023-12-21T05:47:38Z",
                    "os_ref": "14",
                    "x_host_type_number": "3",
                    "host_type": "Server",
                    "x_service_provider": "AWS_EC2_V2",
                    "x_service_account_id": "1234",
                    "x_status": "normal",
                    "x_system_manufacturer": "Xen",
                    "x_system_product_name": "HVM domU"
                },
                "10": {
                    "type": "x-crowdstrike-edr-agent",
                    "load_flags": "1",
                    "local_time": "2023-12-21T05:47:27.598Z",
                    "version": "7.05.17706.0",
                    "config_id_base": "65994763",
                    "config_id_build": "17706",
                    "config_id_platform": "3"
                },
                "11": {
                    "type": "ipv4-addr",
                    "value": "1.2.3.4"
                },
                "12": {
                    "type": "ipv4-addr",
                    "value": "1.1.1.1",
                    "resolves_to_refs": [
                        "13"
                    ]
                },
                "13": {
                    "type": "mac-addr",
                    "value": "12:34:56:78:6b:9b"
                },
                "14": {
                    "type": "software",
                    "x_major_version": "10",
                    "x_minor_version": "0",
                    "version": "Windows Server 2022",
                    "x_id": "0",
                    "name": "Windows"
                }
            },
            "last_observed": "2023-12-21T05:49:07.000Z",
            "first_observed": "2023-12-21T05:48:35.582Z",
            "number_observed": 1
        }
    ],
    "spec_version": "2.0"
}

Multiple Observation

translate crowdstrike_logscale query {} 
"([x-ibm-ttp-tagging:extensions.'mitre-attack-ext'.technique_name = 'Indicator of Attack' OR ipv4-addr:value = '4.4.4.4'] AND [x-oca-asset:x_instance_id = 'i-0123' AND x-ibm-finding:severity > 30 AND file:hashes.MD5 = 'e7a6babc90f4'])START t'2023-12-19T16:43:26.000Z' STOP t'2023-12-24T05:22:26.003Z'"
  

STIX Multiple observation - Output

{
    "queries": [
        {
            "source": "crowdstrike_edr",
            "queryString": "((device.local_ip = \"4.4.4.4\" or device.external_ip = \"4.4.4.4\") or @rawstring = /\"behaviors\"\\s*:\\s*\\[.*\"technique\"\\s*:\\s*\"Indicator\\ of\\ Attack\"/) or ((@rawstring = /\"behaviors\"\\s*:\\s*\\[.*\"parent_details\"\\s*:\\s*\\{.*\"parent_md5\"\\s*:\\s*\"e7a6babc90f4\"/ or @rawstring = /\"behaviors\"\\s*:\\s*\\[.*\"md5\"\\s*:\\s*\"e7a6babc90f4\"/) and (max_severity > 30 and device.instance_id = \"i-0123\")) | tail(10000)",
            "start": 1703004206000,
            "end": 1703395346003
        }
    ]
}

STIX Execute query

execute
crowdstrike_logscale
crowdstrike_logscale
"{\"type\":\"identity\",\"id\":\"identity--f431f809-377b-45e0-aa1c-6a4751cae5ff\",\"name\":\"crowdstrike_logscale\",\"identity_class\":\"system\",\"created\":\"2023-12-24T13:22:50.336Z\",\"modified\":\"2022-12-24T13:22:50.336Z\"}"
"{\"host\":\"xyz\"}"
"{\"auth\":{\"repository\":\"TestRepository\",\"api_token\":  \"123\"}}" 
"[ipv4-addr:value = '3.4.5.6' AND software:version = 'Windows Server 2022' OR x-oca-asset:host_type = 'Server' OR x-crowdstrike-detection-behavior:control_graph_id IN (2048,10240)] START t'2023-12-15T00:00:00.000Z' STOP t'2023-12-22T00:00:00.000Z'"

STIX Execute query - Output

{
    "type": "bundle",
    "id": "bundle--85f7a9d6-9ed4-479f-a218-0ca6defc7a36",
    "objects": [
        {
            "type": "identity",
            "id": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
            "name": "crowdstrike_logscale",
            "identity_class": "system",
            "created": "2023-12-24T13:22:50.336Z",
            "modified": "2023-12-24T13:22:50.336Z"
        },
        {
            "id": "observed-data--91568bc1-74ec-4141-bbc1-d34d8acb72c0",
            "type": "observed-data",
            "created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
            "created": "2023-12-25T06:49:11.126Z",
            "modified": "2023-12-25T06:49:11.126Z",
            "objects": {
                "0": {
                    "type": "file",
                    "x_extension": "exe",
                    "name": "winver.exe",
                    "x_path": "\\Device\\HarddiskVolume1\\Windows\\System32\\winver.exe",
                    "parent_directory_ref": "3",
                    "hashes": {
                        "MD5": "e18a8xxxxxxxxxxxxxxxxxxx9732873",
                        "SHA-256": "02b9af2aaxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx951b10879"
                    }
                },
                "1": {
                    "type": "x-crowdstrike-detection-behavior",
                    "behavior_id": "41002",
                    "confidence": 100,
                    "control_graph_id": "ctg:7xyz:180400197374",
                    "description": "A process triggered a medium severity custom rule.",
                    "name": "CustomIOAWinMedium",
                    "process_ref": "2",
                    "ioc_description": "\\Device\\HarddiskVolume1\\Windows\\System32\\winver.exe",
                    "ioc_source": "library_load",
                    "ioc_type": "hash_sha256",
                    "ioc_value": "02b9af2aaxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx951b10879",
                    "objective": "Falcon Detection Method",
                    "pattern_disposition": 2048,
                    "pattern_disposition_details": {
                        "blocking_unsupported_or_disabled": "false",
                        "bootup_safeguard_enabled": "false",
                        "critical_process_disabled": "false",
                        "detect": "false",
                        "fs_operation_blocked": "false",
                        "handle_operation_downgraded": "false",
                        "inddet_mask": "false",
                        "indicator": "false",
                        "kill_action_failed": "false",
                        "kill_parent": "false",
                        "kill_process": "false",
                        "kill_subprocess": "false",
                        "operation_blocked": "false",
                        "policy_disabled": "false",
                        "process_blocked": "true",
                        "quarantine_file": "false",
                        "quarantine_machine": "false",
                        "registry_operation_blocked": "false",
                        "rooting": "false",
                        "sensor_only": "false",
                        "suspend_parent": "false",
                        "suspend_process": "false"
                    },
                    "rule_instance_id": 3,
                    "rule_instance_version": "3",
                    "scenario": "suspicious_activity",
                    "severity": 50,
                    "ttp_tagging_ref": "6",
                    "template_instance_id": "3",
                    "created_time": "2023-12-21T10:48:26Z",
                    "user_ref": "7"
                },
                "2": {
                    "type": "process",
                    "command_line": "winver",
                    "name": "winver.exe",
                    "binary_ref": "0",
                    "parent_ref": "4",
                    "x_process_graph_id": "pid:7xyz:186025680478",
                    "creator_user_ref": "7"
                },
                "3": {
                    "type": "directory",
                    "path": "\\Device\\HarddiskVolume1\\Windows\\System32"
                },
                "4": {
                    "type": "process",
                    "command_line": "\"C:\\Windows\\system32\\cmd.exe\" ",
                    "binary_ref": "5",
                    "x_process_graph_id": "pid:7xyz:184941492793"
                },
                "5": {
                    "type": "file",
                    "hashes": {
                        "MD5": "e7a6babc90f4",
                        "SHA-256": "eb71xxxxx08"
                    }
                },
                "6": {
                    "type": "x-ibm-ttp-tagging",
                    "name": "Custom Intelligence",
                    "extensions": {
                        "mitre-attack-ext": {
                            "tactic_id": "CSTA0005",
                            "technique_name": "Indicator of Attack",
                            "technique_id": "CST0004"
                        }
                    }
                },
                "7": {
                    "type": "user-account",
                    "user_id": "S-1-5-21-949",
                    "display_name": "Administrator"
                },
                "8": {
                    "type": "x-ibm-finding",
                    "x_behavior_refs": [
                        "1"
                    ],
                    "ttp_tagging_refs": [
                        "6"
                    ],
                    "x_behaviors_processed": [
                        "pid:7xyz:186025680478:41002"
                    ],
                    "time_observed": "2023-12-21T10:48:33.774Z",
                    "x_last_updated": "2023-12-21T10:49:06Z",
                    "name": "ldt:7xyz:180400197374",
                    "src_ip_ref": "11",
                    "src_os_ref": "14",
                    "x_is_email_sent": "false",
                    "x_first_behavior_observed": "2023-12-21T10:48:26Z",
                    "x_last_behavior_observed": "2023-12-21T10:48:26Z",
                    "confidence": 100,
                    "severity": 50,
                    "x_severity_name": "Medium",
                    "x_seconds_to_resolved": "0",
                    "x_seconds_to_triaged": "0",
                    "x_status": "new",
                    "finding_type": "alert"
                },
                "9": {
                    "type": "x-oca-asset",
                    "x_cid": "ef2175xxyyzz440d",
                    "x_agent_ref": "10",
                    "x_bios_manufacturer": "Xen",
                    "x_bios_version": "4.11.amazon",
                    "device_id": "7adb",
                    "ip_refs": [
                        "11",
                        "12"
                    ],
                    "x_first_seen": "2023-05-16T05:10:55Z",
                    "x_device_groups": [
                        "973f",
                        "bb1e1"
                    ],
                    "hostname": "EC2AMA123",
                    "x_instance_id": "i-01234",
                    "x_last_seen": "2023-12-21T10:23:35Z",
                    "mac_refs": [
                        "13"
                    ],
                    "x_last_modified": "2023-12-21T10:44:51Z",
                    "os_ref": "14",
                    "x_host_type_number": "3",
                    "host_type": "Server",
                    "x_service_provider": "AWS_EC2_V2",
                    "x_service_account_id": "1234",
                    "x_status": "normal",
                    "x_system_manufacturer": "Xen",
                    "x_system_product_name": "HVM domU"
                },
                "10": {
                    "type": "x-crowdstrike-edr-agent",
                    "load_flags": "1",
                    "local_time": "2023-12-21T05:47:27.598Z",
                    "version": "7.05.17706.0",
                    "config_id_base": "65994763",
                    "config_id_build": "17706",
                    "config_id_platform": "3"
                },
                "11": {
                    "type": "ipv4-addr",
                    "value": "3.4.5.6"
                },
                "12": {
                    "type": "ipv4-addr",
                    "value": "6.7.8.9",
                    "resolves_to_refs": [
                        "13"
                    ]
                },
                "13": {
                    "type": "mac-addr",
                    "value": "12:85:26:67:6c:9"
                },
                "14": {
                    "type": "software",
                    "x_major_version": "10",
                    "x_minor_version": "0",
                    "version": "Windows Server 2022",
                    "x_id": "0",
                    "name": "Windows"
                }
            },
            "last_observed": "2023-12-21T10:49:06.000Z",
            "first_observed": "2023-12-21T10:48:33.774Z",
            "number_observed": 1
        }
    ],
    "spec_version": "2.0"
}

Recommendations

Connector Usage

  1. For connector usage, it is recommended to maintain logs from single log source per repository in crowdstrike logscale.
  2. Avoid parsing error during ingestion of logs in crowdstrike logscale.

Connector Extension

  1. Separate mapping files needs to be created for each log source.
  2. The structure of log source data ingest into logscale should be of type JSON .
  3. The mapping of list (list of values/list of dictionary) fields in from_stix_map should be mentioned with [''] suffix. Example, behaviors[''].id'. Here 'behaviors' is a list of dictionaries with id as attribute key inside behaviors.

Limitations

  • LIKE,MATCHES, <, >, <=, >= operators are not supported for list of dictionary fields.
  • IN, <, >, <=, >= operators are not supported for array fields

References

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published