-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
living target for ECS #46
Comments
I have a question about the alert( ex: alert.action) category that is being used. Should we be swapping this for the rule category? It would seem that with a little expansion the rule category could encompass all info relating to alerts triggered. Though it is interesting to note that the filebeat-* index has not done so with their Zeek or Suricata modules yet, though I suspect it might be coming. |
I'll take a stab at this. I apologize if I'm missing your question.
I'm unfamiliar with I'm not quite sure Please correct me if I missed what you were asking. |
yup, alert will be included. thanks for bringing it up! Im not sure the exact format of the fields yet - but im adding to the list of applicable fields |
I also noticed those fields in the filebeat modules. That is why I was
confused when the ECS 1.4 docs had no reference to the categories. When I
brought it up on the Elastic Slack someone brought up the new rules
category. It will be interesting to see how it plays out. For now I'm
highlighting the fields in my spreadsheet as possibly changing. Than you
for the further information.
…On Thu, Dec 26, 2019, 9:05 AM Andrew Pease ***@***.***> wrote:
I have a question about the alert( ex: alert.action) category that is
being used. Should we be swapping this for the rule category? It would seem
that with a little expansion the rule category could encompass all info
relating to alerts triggered. Though it is interesting to note that the
filebeat-* index has not done so with their Zeek or Suricata modules yet,
though I suspect it might be coming.
I'll take a stab at this. I apologize if I'm missing your question.
filebeat-* does have suricata.eve.alert.category and
suricata.eve.alert.action as Exported Fields (Note
<https://www.elastic.co/guide/en/beats/filebeat/master/exported-fields-suricata.html>).
I'm not sure it would make sense combined or expanded as they're providing
different information, as you can see below.
suricata.eve.alert.action would be (Note
<https://suricata.readthedocs.io/en/latest/configuration/suricata-yaml.html#suricata-yaml-action-order>
):
• Pass
• Drop
• Reject
• Alert
suricata.eve.alert.category would be:
• PHISHING
• COINMINER
• JA3
• EXPLOIT_KIT
• HUNTING
• ADWARE_PUP
• MALWARE
• ...
I'm unfamiliar with rule.* in the Suricata module, though I'd assume it's
suricata.eve.alert.*.
I'm not quite sure alert would make sense in a Zeek module though,
outside of *maybe* the Intel Framework
<https://www.elastic.co/guide/en/beats/filebeat/master/exported-fields-zeek.html#_intel>,
but I'm not sure that is really an alert in the traditional sense. (Note
<https://www.elastic.co/guide/en/beats/filebeat/master/exported-fields-zeek.html>
).
Please correct me if I missed what you were asking.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#46?email_source=notifications&email_token=AGI5DZ3EMEEUPWWD4ZRN733Q2TP5TA5CNFSM4J57NRH2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEHV2TYA#issuecomment-569092576>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AGI5DZ6ZMLULQ6P6Q7BPIELQ2TP5TANCNFSM4J57NRHQ>
.
|
Logstash
tls.
threat.
rule.
alert.
vulnerability.
event.
error.
log.
dns.
domain.
package.
NSM/sensor info on binaries/software crossing the wire NSM/sensor certain http header fields (ie: x-flash-version), rdp info/software stuff, ssh info/software stuff, etc some windows event logs i can think of, windows update log with info on the updates available OR when packages are removed/uninstalled ASA/VPN client software info from the router/firewall itself
client.
server.
destination.
source.
file.
dns.
question.subdomain
question.top_level_domain
domain.
subdomain
top_level_domain
client.
subdomain
top_level_domain
server.
subdomain
top_level_domain
destination.
subdomain
top_level_domain
source.
subdomain
top_level_domain
dns.question.registered_domain
is required field now for SIEM DNS tabKibana
Etc
TAP DEVICE SETUP to support (major) jumbo MTU shenanigans
Create virtual interface
This doesn't appear to work, would drop my interfaces.
sudo ip tuntap add dev foo0 mode tap
This did work on my box though with out dropping my interface on a physical machine. Still drops on a VM.
sudo ip link add dev foo0 type dummy
set interface to largest mtu
sudo ip link set dev foo0 mtu 65521
Bring the interface up
sudo ip link set foo0 up
Configure zeek to ignore checksums
Configure Suricata to deal with this shenanigans
sudo vi /etc/suricata/rocknsm-overrides.yaml
Redeploy ROCK
sudo /usr/sbin/deploy_rock.sh
Restart zeek, suricata, and stenographer
sudo systemctl enable stenographer@foo0 stenographer
sudo systemctl restart zeek suricata stenographer@foo0
Run tcpreplay (in another shell)
sudo tcpreplay -i -M 10 foobar pcaps/day1.pcap
If you need to time travel to separate out multiple pcap's into different days
Stop all the services
systemctl stop elasticsearch kafka zookeeper suricata stenographer zeek logstash
Copy any steno files you want to snapshot
cp -R /data/stenographer/foobar/thread0/ /home/admin/steno_snapshots/day1/.
Clean up the steno directory for next run
rm -rf /data/stenographer/foobar/thread0/*
Time travel to desired time
date -s "2 SEP 2018 11:00:00"
Start up the services
systemctl start elasticsearch zookeeper kafka suricata stenographer zeek logstash
Wait till the services are settled and running
Replay your next set of pcap's through the dummy interface.
tcpreplay -i foobar /home/admin/pcaps/day2.pcap
The text was updated successfully, but these errors were encountered: