Change log for SENTINEL_EDR
Date | Changes |
---|---|
2024-07-29 | Enhancement:
- If "registry.keyPath" or "registry.value" is not null, then only mapped "metadata.event_type" to "REGISTRY_CREATION". |
2024-07-23 | Enhancement:
- Mapped "agentDetectionInfo.agentOsName" to "target.platform_version". - Mapped "agentDetectionInfo.agentLastLoggedInUserName" to "target.user.userid". |
2024-07-09 | Bug-Fix:
- Changed mapping for "suser" from "principal.user.userid" to "target.user.userid". - Changed mapping for "suser" from "principal.user.user_display_name" to "target.user.user_display_name". - Removed mapping for "accountId" from "target.user.userid". - Mapped "prin_user" to "principal.user.userid". |
2024-06-03 | Enhancement:
- Mapped "suser" to "principal.user.userid". - Mapped "accountId" to "target.user.userid". - Mapped "MessageSourceAddress" to "principal.ip". - Mapped "machine_host" to "principal.hostname". |
2024-05-20 | Enhancement:
- Mapped "event.dns.response" to "network.dns.answers.data". |
2024-05-06 | Enhancement:
- Added support for a new pattern of JSON logs. |
2024-03-22 | Enhancement:
- Added new Grok pattern to parse new format of tab-separated KV logs. - Mapped "osName" to "src.platform". |
2024-03-15 | Enhancement:
- Mapped "site.id:account.id:agent.uuid:tgt.process.uid" to "target.process.product_specific_process_id". - Mapped "site.id:account.id:agent.uuid:src.process.uid" to "principal.process.product_specific_process_id". - Mapped "site.id:account.id:agent.uuid:src.process.parent.uid" to "principal.process.parent_process.product_specific_process_id". - Removed "src.process.cmdline" from being mapped to "target.process.command_line". |
2023-11-09 | Fix:
- Mapped "tgt.process.user" to "target.user.userid". |
2023-10-30 | Fix:
- Added not null check to "principal_port" prior mapping to UDM. - When "event.category" is "url" and "meta.event.name" is "HTTP", mapped "metadata.event_type" to "NETWORK_HTTP". |
2023-09-06 | - Added mapping of "tgt.process.storyline.id" to "security_result.about.resource.attribute.labels".
- Modified mapping of "src.process.storyline.id" from "principal.process.product_specific_process_id" to "security_result.about.resource.attribute.labels". - Modified mapping of "src.process.parent.storyline.id" from "principal.parent.process.product_specific_process_id" to "security_result.about.resource.attribute.labels". |
2023-08-31 | - Mapped "indicator.category" to "security_result.category_details".
|
2023-08-03 | - Initialized "event_data.login.loginIsSuccessful" to null.
- Mapped "module.path" to "target.process.file.full_path" and "target.file.full_path" where "event.type" is "Module Load". - Mapped "module.sha1" to "target.process.file.sha1" and "target.file.sha1" where "event.type" is "Module Load". - Mapped "metadata.event_type" to "PROCESS_MODULE_LOAD" where "event.type" is "Module Load". - Mapped "registry.keyPath" to "target.registry.registry_key" for "REGISTRY_*" events. - Mapped "registry.value" to "target.registry.registry_value_data" for "REGISTRY_*" events. - Mapped "event.network.protocolName" to "network.application_protocol". - Mapped "principal.platform", "principal.asset.platform_software.platform" to "LINUX" if "endpoint.os" is "linux". - Mapped "event.login.userName" to "target.user.userid" when "event.type" is "Login" or "Logout." - Mapped "target.hostname" by obtaining the hostname from "url.address" when "event.type" is "GET", "OPTIONS", "POST", "PUT", "DELETE", "CONNECT", "HEAD". |
2023-06-09 | - Mapped "osSrc.process.parent.publisher" to "principal.resource.attribute.labels".
- Mapped "src.process.rUserName/src.process.eUserName/src.process.lUserName" to "principal.user.user_display_name". - Added check to fields: "src.process.eUserId", "src.process.lUserId", "tgt.process.rUserUid" prior mapping to UDM. - Mapped "tgt.file.location", "registry.valueFullSize", "registry.valueType" to "target.resource.attribute.labels". - Mapped "indicator.description" to "security_result.summary". - Mapped "metadata.event_type" to "SCAN_NETWORK" where "event.type" is "Behavioral Indicators". - Mapped "metadata.event_type" to "SCAN_UNCATEGORIZED" where "event.type" is "Command Script". - Initialized fields "meta.osFamily", "meta.osRevision", "event.type". - Added ISO8601 to date filter to parser ISO8601 timestamp. - Added on_error to "@timestamp" string conversion. - Added on_error to "meta.uuid" prior mapping. |
2023-05-25 | - Mapped "event.source.commandLine" to "principal.process.command_line".
- Mapped "event.source.executable.path" to "principal.process.file.full_path". - Set "metadata.event_type" to "PROCESS_OPEN" where "event.type" is "openProcess". - Mapped "site.name:site.id" to "principal.namespace" if both "site.name" and "site.id" are not null. - Mapped "event.network.direction" to "network.direction". - Mapped "meta.event.name" to "metadata.description". - Mapped "task.name" to "target.resource.name". - Mapped "agent.uuid" to "principal.asset.product_object_id". - Mapped "src.process.publisher" to "principal.resource.attribute.labels". - Mapped "src.process.cmdline" to "target.process.command_line". - Mapped "mgmt.osRevision" to "principal.asset.platform_software.platform_version". - Mapped "security_result.category" according to "indicator.category" value. - Mapped "event.dns.response" to "network.dns.answers". - Mapped "registry.keyPath" to "target.registry.registry_key". - Mapped "event.id" to "target.registry.registry_value_name". |
2023-04-27 | - Mapped "event.type" to "metadata.product_event_type" for Cloud Funnel v2 logs.
|
2023-04-20 | Enhancement:
- Added null and '-' conditinal check for the field "data.ipAddress". - Added grok conditional check for the field "sourceMacAddresses". |
2023-03-02 | Enhancement:
- When ("event.type" == "tcpv4" and "event.direction" == "INCOMING") or "event.type" contains "(processExit|processTermination|processModification|duplicate)" , then mapped "event.source.executable.signature.signed.identity" to "target.resource.attribute.labels" else mapped it to "principal.resource.attribute.labels". - Mapped "event.parent.executable.signature.signed.identity", "event.process.executable.signature.signed.identity to "principal.resource.attribute.labels", "". - Mapped "event.targetFile.signature.signed.identity", "event.target.executable.signature.signed.identity", "event.target.parent.executable.signature.signed.identity" to "target.resource.attribute.labels". |
2023-02-24 | BugFix:
- Refactored the code to clearly differentiate between the log versions. - For USER_LOGIN cloud funnel v2 logs, mapped "event.login.lognIsSuccessful" details to "security_result.action" and "security_result.summary" |
2023-02-13 | BugFix:
- Parsed cloud funnel v1 logs as required. - Mapping all http logs to "NETWORK_HTTP". - "NETWORK_HTTP" should have url field mapped to "target.url" instead of "metadata.url_back_to_product". |
2023-01-20 | Enhancement:
- Mapped the field 'event.url' to 'target.hostname' and 'target.url'. - Mapped 'metadata.event_type' to 'NETWORK_HTTP' where 'event.type' == 'http'. |
2023-01-16 | Fix
- Mapped "mgmt.url" to "metadata.url_back_to_product" instead of "target.url". - Mapped "site.name" to "principal.location.name". - Mapped "src.process.rUserUid" to "principal.user.userid". - Mapped "src.process.eUserId" to "principal.user.userid". - Mapped "src.process.lUserId" to "principal.user.userid". - Mapped "src.process.parent.rUserUid" to "metadata.ingestion_labels". - Mapped "src.process.parent.eUserId" to "metadata.ingestion_labels". - Mapped "src.process.parent.lUserId" to "metadata.ingestion_labels". - Mapped "tgt.process.rUserUid" to "target.user.userid". - Mapped "tgt.process.eUserId" to "target.user.userid". - Mapped "tgt.process.lUserId" to "target.user.userid". - If "event.type" is "Process Creation" mapped "metadata.event_type" to "PROCESS_LAUNCH". - If "event.type" is "Duplicate Process Handle" mapped "metadata.event_type" to "PROCESS_OPEN". - If "event.type" is "Duplicate Thread Handle" mapped "metadata.event_type" to "PROCESS_OPEN". - If "event.type" is "Open Remote Process Handle" mapped "metadata.event_type" to "PROCESS_OPEN". - If "event.type" is "Remote Thread Creation" mapped "metadata.event_type" to "PROCESS_LAUNCH". - If "event.type" is "Command Script" mapped "metadata.event_type" to "FILE_UNCATEGORIZED". - If "event.type" is "IP Connect" mapped "metadata.event_type" to "NETWORK_CONNECTION". - If "event.type" is "IP Listen" mapped "metadata.event_type" to "NETWORK_UNCATEGORIZED". - If "event.type" is "File ModIfication" mapped "metadata.event_type" to "FILE_MODIfICATION". - If "event.type" is "File Creation" mapped "metadata.event_type" to "FILE_CREATION". - If "event.type" is "File Scan" mapped "metadata.event_type" to "FILE_UNCATEGORIZED". - If "event.type" is "File Deletion" mapped "metadata.event_type" to "FILE_DELETION". - If "event.type" is "File Rename" mapped "metadata.event_type" to "FILE_MODIfICATION". - If "event.type" is "Pre Execution Detection" mapped "metadata.event_type" to "FILE_UNCATEGORIZED". - If "event.type" is "Login" mapped "metadata.event_type" to "USER_LOGIN". - If "event.type" is "Logout" mapped "metadata.event_type" to "USER_LOGOUT". - If "event.type" is "GET" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "OPTIONS" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "POST" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "PUT" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "DELETE" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "CONNECT" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "HEAD" mapped "metadata.event_type" to "NETWORK_HTTP". - If "event.type" is "Not Reported" mapped "metadata.event_type" to "STATUS_UNCATEGORIZED". - If "event.type" is "DNS Resolved" mapped "metadata.event_type" to "NETWORK_DNS". - If "event.type" is "DNS Unresolved" mapped "metadata.event_type" to "NETWORK_DNS". - If "event.type" is "Task Register" mapped "metadata.event_type" to "SCHEDULED_TASK_CREATION". - If "event.type" is "Task Update" mapped "metadata.event_type" to "SCHEDULED_TASK_MODIfICATION". - If "event.type" is "Task Start" mapped "metadata.event_type" to "SCHEDULED_TASK_UNCATEGORIZED". - If "event.type" is "Task Trigger" mapped "metadata.event_type" to "SCHEDULED_TASK_UNCATEGORIZED". - If "event.type" is "Task Delete" mapped "metadata.event_type" to "SCHEDULED_TASK_DELETION". - If "event.type" is "Registry Key Create" mapped "metadata.event_type" to "REGISTRY_CREATION". - If "event.type" is "Registry Key Rename" mapped "metadata.event_type" to "REGISTRY_MODIfICATION". - If "event.type" is "Registry Key Delete" mapped "metadata.event_type" to "REGISTRY_DELETION". - If "event.type" is "Registry Key Export" mapped "metadata.event_type" to "REGISTRY_UNCATEGORIZED". - If "event.type" is "Registry Key Security Changed" mapped "metadata.event_type" to "REGISTRY_MODIfICATION". - If "event.type" is "Registry Key Import" mapped "metadata.event_type" to "REGISTRY_CREATION". - If "event.type" is "Registry Value ModIfied" mapped "metadata.event_type" to "REGISTRY_MODIfICATION". - If "event.type" is "Registry Value Create" mapped "metadata.event_type" to "REGISTRY_CREATION". - If "event.type" is "Registry Value Delete" mapped "metadata.event_type" to "REGISTRY_DELETION". - If "event.type" is "Behavioral Indicators" mapped "metadata.event_type" to "SCAN_UNCATEGORIZED". - If "event.type" is "Module Load" mapped "metadata.event_type" to "PROCESS_MODULE_LOAD". - If "event.type" is "Threat Intelligence Indicators" mapped "metadata.event_type" to "SCAN_UNCATEGORIZED". - If "event.type" is "Named Pipe Creation" mapped "metadata.event_type" to "PROCESS_UNCATEGORIZED". - If "event.type" is "Named Pipe Connection" mapped "metadata.event_type" to "PROCESS_UNCATEGORIZED". - If "event.type" is "Driver Load" mapped "metadata.event_type" to "PROCESS_MODULE_LOAD". |
2022-11-30 | Enhancement
- Enhanced the parser to support the logs ingested in version V2 by mapping following fields. - Mapped "account.id" to "metadata.product_deployment_id". - Mapped "agent.uuid" to "principal.asset.asset_id". - Mapped "dst.ip.address" to "target.ip". - Mapped "src.ip.address" to "principal.ip". - Mapped "src.process.parent.image.sha1" to "principal.process.parent_process.file.sha1". - Mapped "src.process.parent.image.sha256" to "principal.process.parent_process.file.sha256". - Mapped "src.process.parent.image.path" to "principal.process.parent_process.file.full_path". - Mapped "src.process.parent.cmdline" to "principal.process.parent_process.command_line". - Mapped "src.process.parent.image.md5" to "principal.process.parent_process.file.md5". - Mapped "src.process.parent.pid" to "principal.process.parent_process.pid". - Mapped "src.process.image.sha1" to "principal.process.file.sha1". - Mapped "src.process.image.md5" to "principal.process.file.md5". - Mapped "src.process.pid" to "principal.process.pid". - Mapped "src.process.cmdline" to "principal.process.command_line". - Mapped "src.process.image.path" to "principal.process.file.full_path". - Mapped "src.process.image.sha256" to "principal.process.file.sha256". - Mapped "src.process.user" to "principal.user.user_display_name". - Mapped "src.process.uid" to "principal.user.userid". - Mapped "src.process.storyline.id" to "principal.process.product_specific_process_id". - Mapped "src.process.parent.storyline.id" to "principal.process.parent_process.product_specific_process_id". - Mapped "mgmt.url" to "target.url". - Mapped "site.id" to "principal.namespace". - Mapped "src.port.number" to "principal.port". - Mapped "dst.port.number" to "target.port". - Mapped "event_data.id" to "metadata.product_log_id". |
2022-10-11 | Enhancement
- Mapped "threatClassification" to "security_result.category_details". - Mapped "threatConfidenceLevel" and "threatMitigationStatus" to "security_result.detection_fields". - Mapped "Location" to "principal.location.name". - Mapped "data.filePath" to "principal.process.parent_process.file.full_path". - Updated the mapping (CAT Value)security_result.category_details to metadata.product_event_type |
2022-09-01 | Enhancement
- Changed metadata.product_name from SentinelOne to Singularity. - Mapped "event.regValue.key.value" to "target.registry.registry_value_name". - Mapped "principal_userid" to "principal.user.userid". - Mapped "principal_domain" to "principal.administrative_domain". - Mapped "threatInfo.threatId" to "security_result.threat_id" - Mapped "threatInfo.identifiedAt" to "metadata.event_timestamp". - Mapped "threatInfo.threatId" to "metadata.product_log_id". - Mapped "security_result.alert_state" to "ALERTING". - Mapped "threatInfo.maliciousProcessArguments" to "security_result.description". - Mapped "threatInfo.threatName" to "security_result.threat_name". - Mapped "threatInfo.classification" to "security_result.category_details". - Mapped "security_result.category" to "SOFTWARE_MALICIOUS" where threatInfo.classification is malicious else to "NETWORK_SUSPICIOUS". - Mapped "security_result.action" to "ALLOW" where threatInfo.mitigationStatus is mitigated else to "BLOCK". - Mapped "threatInfo.mitigationStatus" to "security_result.action_details". - Mapped "threatInfo.classification threatInfo.classificationSource threatInfo.analystVerdictDescription threatInfo.threatName" to "security_result.summary". - Mapped "threatInfo.createdAt" to "metadata.collected_timestamp". - Mapped "agentRealtimeInfo.accountId" to "metadata.product_deployment_id". - Mapped "agentRealtimeInfo.agentVersion" to "metadata.product_version". - Mapped "indicator.category" to "detection_fields.key" and "indicator.description" to "detection_fields.value". - Mapped "detectionEngines.key" to "detection_fields.key" and "detectionEngines.title" to "detection_fields.value". - Mapped "metadata.event_type" to "SCAN_UNCATEGORIZED" where "meta.computerName" is not null. |
2022-07-21 | Enhancement
- Mapped event.source.executable.hashes.md5 to principal.process.file.md5. - Mapped event.source.executable.hashes.sha256 to principal.process.file.sha256. - Mapped event.source.executable.hashes.sha1 to principal.process.file.sha1. - Mapped event.source.fullPid.pid to principal.process.pid. - Mapped event.source.user.name to principal.user.userid. - Mapped meta.agentVersion to metadata.product_version. - Mapped event.appName to target.application. - Mapped event.contentHash.sha256 to target.process.file.sha256. - Mapped event.source.commandLine to target.process.command_line. - Mapped event.decodedContent to target.labels. - Changed metadata.description from scripts to Command Scripts where event.type is scripts. - Mapped vendor to metadata.vendor_name. - Mapped data.fileContentHash to target.process.file.md5. - Mapped data.ipAddress to principal.ip. - Mapped activityUuid to target.asset.product_object_id. - Mapped agentId to metadata.product_deployment_id. - Added email verification for user_email prior to mapping it to principal.user.email_addresses, if failed mapped it to principal.user.userid. - Mapped sourceIpAddresses to principal.ip. - Mapped accountName to principal.administrative_domain. - Mapped activityId to additional.fields. |
2022-07-15 | Enhancement - Parsed the new logs with JSON format and mapped the following new fields:-
- "metadata.product_name" to "SENTINEL_ONE". - "sourceParentProcessMd5" to "principal.process.parent_process.file.md5". - "sourceParentProcessPath" to "principal.process.parent_process.file.full_path". - "sourceParentProcessPid" to "principal.process.parent_process.pid". - "sourceParentProcessSha1" to "principal.process.parent_process.file.sha1". - "sourceParentProcessSha256" to "principal.process.parent_process.file.sha256". - "sourceParentProcessCmdArgs" to "principal.process.parent_process.command_line". - "sourceProcessCmdArgs" to "principal.process.command_line". - "sourceProcessMd5" to "principal.process.file.md5". - "sourceProcessPid" to "principal.process.pid". - "sourceProcessSha1" to "principal.process.file.sha1". - "sourceProcessSha256" to "principal.process.file.sha256". - "sourceProcessPath" to "principal.process.file.full_path". - "tgtFilePath" to "target.file.full_path". - "tgtFileHashSha256" to "target.file.sha256". - "tgtFileHashSha1" to "target.file.sha1". - "tgtProcUid" to "target.process.product_specific_process_id". - "tgtProcCmdLine" to "target.process.command_line". - "tgtProcPid" to "target.process.pid". - "tgtProcName" to "target.application". - "dstIp" to "target.ip". - "srcIp" to "principal.ip". - "dstPort" to "target.port". - "srcPort" to "principal.port". - "origAgentName" to "principal.hostname". - "agentIpV4" to "principal.ip". - "groupId" to "principal.user.group_identifiers". - "groupName" to "principal.user.group_display_name". - "origAgentVersion" to "principal.asset.software.version". - "origAgentOsFamily" to "principal.platform". - "origAgentOsName" to principal.asset.software.name". - "event_type" to "FILE_MODIFICATION" when sourceEventType = FILEMODIFICATION. - "event_type" to "FILE_DELETION" when sourceEventType = FILEDELETION. - "event_type" to "PROCESS_LAUNCH" when sourceEventType = PROCESSCREATION. - "event_type" to "NETWORK_CONNECTION" when sourceEventType = TCPV4. |
2022-06-13 | Enhancement
- for [event][type] == "fileCreation" and [event][type] == "fileDeletion" - Mapped "event.targetFile.path" to "target.file.full_path". - Mapped "event.targetFile.hashes.md5" to "target.process.file.md5". - Mapped "event.targetFile.hashes.sha1" to "target.process.file.sha1". - Mapped "event.targetFile.hashes.sha256" to "target.process.file.sha256". - for [event][type] == "fileModification" - Mapped "event.file.path" to "target.file.full_path". - Mapped "event.file.hashes.md5" to "target.process.file.md5". - Mapped "event.file.hashes.sha1" to "target.process.file.sha1". - Mapped "event.file.hashes.sha256" to "target.process.file.sha256". |
2022-04-18 | - Enhanced the parser to handle all the unparsed raw logs.
|