Change log for THINKST_CANARY
Date | Changes |
---|---|
2024-07-17 | Enhancement:
- Added support for the following events: "Remote registry connection", "Canarytoken triggered", "File share connection", "RDP connection made", and "Canary settings changed". |
2024-07-03 | Enhancement:
- Added support for "dns" logs. |
2024-05-10 | Enhancement:
- Added support for "Flock Settings Changed" events. - If value of "_md_product_event_type" is "Flock Settings Changed", added a Grok pattern to extract "user_id" from the field "elem.SETTINGS". - Mapped "user_id" to "principal.user.userid". |
2024-03-05 | Enhancement:
- Added support for "SIP Request" events. - Added support for "TFTP Request" events. - Mapped "hash_id" to "principal.file.sha1". - Mapped "HEADERS.user-agent" to "network.http.user_agent". - Mapped "description.node_id" to "principal.resource.attribute.labels". - Mapped "description.flock_id" to "principal.resource.attribute.labels". - Mapped "description.flock_name" to "principal.resource.attribute.labels". - Mapped "description.logtype" to "security_result.detection_fields". - Mapped "description.events_count" to "security_result.detection_fields". - Mapped "HEADERS.allow" to "security_result.detection_fields". - Mapped "HEADERS.call-id" to "security_result.detection_fields". - Mapped "HEADERS.contact" to "security_result.detection_fields". - Mapped "HEADERS.sip" to "security_result.detection_fields". - Mapped "HEADERS.cseq" to "security_result.detection_fields". - Mapped "HEADERS.expires" to "security_result.detection_fields". - Mapped "HEADERS.from" to "security_result.detection_fields". - Mapped "HEADERS.to" to "security_result.detection_fields". - Mapped "HEADERS.max-forwards" to "security_result.detection_fields". |
2023-12-08 | Enhancement:
- Since all "THINKST_CANARY" alerts are "critical" by default, set "is_alert" to "true" for all events. - Since all "THINKST_CANARY" alerts are "critical" by default, set "is_significant" to "true" for all events. - Since all "THINKST_CANARY" alerts are "critical" by default, set "security_result.severity" to "CRITICAL" for all events. - Added support for "NMAP OS Scan Detected" events. |
2023-12-07 | Enhancement:
- Added support for "WinRM Login Attempt", "Telnet Login Attempt", "NMAP OS Scan Detected", "Redis Command" events. - Added support to parse new pattern of "_metadata_event_timestamp","_event_time". |
2023-09-15 | Enhancement:
- Added support for 'VNC Login Attempt' events. |
2023-08-04 | Bug Fix:
Following changes have been made for Canarytoken triggered events: - Mapped to more specific event_type, for example "NETWORK_CONNECTION". - As 'resource.id' is deprecated, mapped 'canarytoken' to principal.resource.product_object_id. - Also 'event.idm.is_alert' is set to 'true' for the given event. - Set 'security_result.category' to 'NETWORK_SUSPICIOUS. |
2023-05-12 | Bug Fix - Added support for logs having "description.summary"="MSSQL Login Attempt" and mapped "event_type" to "USER_LOGIN";
|
2022-12-04 | Bug Fix -
- Added support for "HTTP Login Attempt", "FTP Login Attempt", "Website Scan", "Console Settings Changed", "RDP Login Attempt". |