Change log for CS_DETECTS
Date | Changes |
---|---|
2024-10-11 | - Added support for the CrowdStrike alert logs.
|
2024-09-12 | Enhancement:
- Mapped "status" to "security_result.detection_fields". - When "status" is not "cleared", then removed mapping of "security_result.threat_status". |
2024-04-02 | Enhancement:
- Mapped "first_behavior" to "metadata.event_timestamp". - Mapped "created_timestamp" to "metadata.collected_timestamp". - Mapped "url_back_to_product" to "metadata.url_back_to_product". - Changed mapping of "device.external_ip" from "target.ip"" to "principal.nat_ip". - Changed mapping of "device.platform_name" from "target.asset.platform_software.platform" to "principal.asset.platform_software.platform". - Changed mapping of "device.os_version" from "target.asset.platform_software.platform_version" to "principal.asset.platform_software.platform_version". - Changed mapping of "device.agent_version" from "target.asset.platform_software.platform_patch_level" to "principal.asset.platform_software.platform_patch_level". - Changed mapping of "device.first_seen" from "target.asset.first_seen_time" to "principal.asset.first_seen_time". - Changed mapping of "device.last_seen" from "target.asset.attribute.labels" to "principal.asset.attribute.labels". - Changed mapping of "device.product_type_desc" from "target.asset.type" to "principal.asset.type". - Changed mapping of "behavior.device_id" from "target.asset_id" to "principal.asset_id". |
2024-03-20 | Enhancement:
- Mapped "behavior.display_name" to "security_result.summary". - When index is "0", then mapped "behavior.technique" to "security_result.rule_name". - When index is "0", then mapped "behavior.technique_id" to "security_result.rule_id". - When index is "0", then mapped "behavior.confidence" to "security_result.confidence_details". |
2024-01-31 | Bug-Fix:
- Added data check before mapping "behavior.ioc_value" to "target.file.sha256". - Added data check before mapping "behavior.sha256" to "target.file.sha256". - Added data check before mapping "behavior.md5" to "target.process.file.md5". - Added data check before mapping "behavior.parent_details.parent_md5" to "target.process.file.md5". - Added data check before mapping "behavior.parent_details.parent_sha256" to "target.process.parent_process.file.sha256". |
2023-07-21 | - Added MITRE ATT&CK tactic and technique details mapping to "security_result.attack_details".
|
2023-06-07 | - Mapped "behaviors.tactic" to "security_result.attack_details.tactics.name".
- Mapped "behaviors.tactic_id" to "security_result.attack_details.tactics.id". - Mapped "behaviors.technique" to "security_result.attack_details.techniques.name". - Mapped "behaviors.technique_id" to "security_result.attack_details.techniques.id". |
2023-04-26 | Fix -
- Mapped "metadata.event_type" to "GENERIC_EVENT" if both "device.local_ip" and "device.hostname" are null. - Mapped "behavior.ioc_source" to "metadata.product_event_type". - Mapped "behavior.ioc_description" to "target.file.full_path". - If "behavior.ioc_type" is "exe", then "target.file.file_type" is set to "FILE_TYPE_PE_EXE". - Mapped "behavior.ioc_value" to "target.file.sha256". - Mapped "behavior.filename" to "security_result.threat_name". |
2023-02-28 | Enhancement -
- Mapped "device.platform_name" to "target.asset.platform_software.platform". - Mapped "device.os_version" to "target.asset.platform_software.platform_version". - Mapped "device.agent_version" to "target.asset.platform_software.platform_patch_level". - Mapped "device.first_seen" to "target.asset.first_seen_time". - Mapped "device.last_seen" to "target.asset.attribute.labels". - Mapped "device.product_type_desc" as follow: - if "device.product_type_desc" is "Mobile" then mapped "target.asset.type" as "Mobile". - if "device.product_type_desc" is "WORKSTATION" then mapped "target.asset.type" as "Compute" or "Workstation". - if "device.product_type_desc" is "IOT" then mapped "target.asset.type" as "Iot". - if "device.product_type_desc" is "SERVER" then mapped "target.asset.type" as "Server". - else mapped the field "device.product_type_desc" to "target.asset.attribute.labels". - Mapped "max_severity_displayname" to "security_result.severity". |
2023-02-17 | Enhancement -
- If "detection_id" is not null and "url_back_to_product" is not null then mapped "url_back_to_product/activity/detections/detail/detection_id_values.1/detection_id_values.2?_cid=%{cid}" to "metadata.url_back_to_product". |
2023-02-07 | Enhancement -
- Mapped "behavior.timestamp" to "security_result.detection_fields". - Mapped "behavior.behavior_id" to "security_result.detection_fields". - Mapped each behavior into a different security_result. |
2023-02-01 | Enhancement -
- Mapped "max_severity_displayname" to "security_result.severity". - Mapped "security_result.action" to "BLOCK" and "security_result.threat_status" to "CLEARED" if any of ["kill_process", "kill_subprocess", "kill_parent", "operation_blocked", "process_blocked", "registry_operation_blocked", "fs_operation_blocked", "suspend_process", "suspend_parent"] are true. - Mapped "security_result.action" to "QUARANTINE" and "security_result.threat_status" to "CLEARED" if "quarantine_file" or "quarantine_machine" are true. |
2022-09-29 | Enhancement -
- Mapped "metadata.product_name" to "Falcon". - Mapped "metadata.vendor_name" to "Crowdstrike". - Mapped "security_result.alert_state" to "ALERTING". |
2022-09-21 | Enhancement -
- Changed "metadata.event_type" from PROCESS_UNCATEGORIZED to SCAN_UNCATEGORIZED where technique is Indicator of Compromise. - Added sha256 format regex check for "behavior.sha256" and "behavior.parent_details.parent_sha256" prior mapping them to udm. |
2022-08-25 | Bug:
- Added md5 format regex check for "behavior.md5" and "behavior.parent_details.parent_md5" prior mapping them to udm. - Dropped the logs that are malformed and has no valid data. |
2022-08-16 | Enhancement -
- Modified mapping of cid from metadata.product_log_id to metadata.product_deployment_id. - Mapped detection_id to metadata.product_log_id. - Mapped created_timestamp to metadata.event_timestamp. |
2022-08-09 | Newly created parser.
|