-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
363abe2
commit 47a84e5
Showing
21 changed files
with
1,335 additions
and
137 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -684,6 +684,89 @@ This section demonstrates how the raw logs will be transformed by our parsers. I | |
``` | ||
|
||
|
||
=== "mobile_detection_network_connections.json" | ||
|
||
```json | ||
|
||
{ | ||
"message": "{\"metadata\":{\"customerIDString\":\"0123456789ABCDEFGHIJKLMNOPQRSTUV\",\"offset\":13896542,\"eventType\":\"MobileDetectionSummaryEvent\",\"eventCreationTime\":1722754343000,\"version\":\"1.0\"},\"event\":{\"SensorId\":\"85ae98xxxxxxd9a8f2\",\"MobileDetectionId\":2,\"ComputerName\":\"host\",\"UserName\":\"[email protected]\",\"ContextTimeStamp\":1722754273,\"DetectId\":\"0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2\",\"DetectName\":\"CkbSensorDetectDomainHighUI\",\"DetectDescription\":\"A domain lookup matched a CrowdStrike Intelligence indicator that has previously been used in targeted attacks.\",\"Tactic\":\"Falcon Intel\",\"TacticId\":\"CSTA0008\",\"Technique\":\"Intelligence Indicator - Domain\",\"TechniqueId\":\"CST0023\",\"Objective\":\"Falcon Detection Method\",\"Severity\":70,\"FalconHostLink\":\"https://falcon.eu-1.crowdstrike.com/mobile/detections/0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2?_cid=0123456789ABCDEFGHIJKLMNOPQRSTUV\",\"MobileNetworkConnections\":[{\"AccessTimestamp\":1722754273,\"Protocol\":\"6\",\"ConnectionFlags\":0,\"LocalAddress\":\"\",\"RemoteAddress\":\"1.2.3.4\",\"RemotePort\":1,\"ConnectionDirection\":0,\"Url\":\"https://crowdstrike.test.com/integration\",\"IsIPV6\":false,\"ContextProcessId\":17793441978049446000}],\"ApplicationName\":\".com.google.chrome.ios\",\"NetworkDetectionType\":\"prevented\",\"SourceVendors\":\"CrowdStrike\",\"SourceProducts\":\"Falcon for Mobile\",\"DataDomains\":\"Endpoint\",\"PatternId\":41124,\"CompositeId\":\"7da61e27e34f4b8394081896af72e2c7:ind:2250689c5d8e43ccad2f5a7b56bced5b:41124|2\",\"Name\":\"CkbSensorDetectDomainHighUI\",\"Description\":\"A domain lookup matched a CrowdStrike Intelligence indicator that has previously been used in targeted attacks.\"}}", | ||
"event": { | ||
"action": "prevented", | ||
"category": [ | ||
"intrusion_detection" | ||
], | ||
"dataset": [ | ||
"MobileDetection" | ||
], | ||
"kind": "alert", | ||
"severity": 70, | ||
"type": "info", | ||
"url": "https://falcon.eu-1.crowdstrike.com/mobile/detections/0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2?_cid=0123456789ABCDEFGHIJKLMNOPQRSTUV" | ||
}, | ||
"@timestamp": "2024-08-04T06:52:23Z", | ||
"agent": { | ||
"id": "85ae98xxxxxxd9a8f2" | ||
}, | ||
"crowdstrike": { | ||
"customer_id": "0123456789ABCDEFGHIJKLMNOPQRSTUV", | ||
"detect_description": "A domain lookup matched a CrowdStrike Intelligence indicator that has previously been used in targeted attacks.", | ||
"detect_id": "0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2", | ||
"detect_name": "CkbSensorDetectDomainHighUI", | ||
"event_objective": "Falcon Detection Method", | ||
"event_type": "MobileDetectionSummaryEvent", | ||
"mobile": { | ||
"network_connections": [ | ||
{ | ||
"context": { | ||
"pid": "17793441978049446000" | ||
}, | ||
"destination": { | ||
"address": "1.2.3.4", | ||
"port": 1 | ||
}, | ||
"direction": 0, | ||
"flags": 0, | ||
"is_ipv6": false, | ||
"protocol": 6, | ||
"timestamp": "2024-08-04T06:51:13.000000Z", | ||
"url": "https://crowdstrike.test.com/integration" | ||
} | ||
] | ||
} | ||
}, | ||
"host": { | ||
"name": "host" | ||
}, | ||
"network": { | ||
"application": ".com.google.chrome.ios" | ||
}, | ||
"observer": { | ||
"product": "Falcon for Mobile", | ||
"vendor": "CrowdStrike" | ||
}, | ||
"related": { | ||
"user": [ | ||
"[email protected]" | ||
] | ||
}, | ||
"threat": { | ||
"tactic": { | ||
"id": "CSTA0008", | ||
"name": "Falcon Intel" | ||
}, | ||
"technique": { | ||
"id": "CST0023", | ||
"name": "Intelligence Indicator - Domain" | ||
} | ||
}, | ||
"user": { | ||
"name": "[email protected]" | ||
} | ||
} | ||
``` | ||
|
||
|
||
=== "mobile_detection_summary_1.json" | ||
|
||
```json | ||
|
@@ -1236,6 +1319,7 @@ The following table lists the fields that are extracted, normalized under the EC | |
|`crowdstrike.incident_id` | `keyword` | The incident ID of the incident | | ||
|`crowdstrike.incident_start` | `date` | Time of the first activity in the incident | | ||
|`crowdstrike.incident_type` | `keyword` | Identity-based incident or detection name | | ||
|`crowdstrike.mobile.network_connections` | `array` | Mobile network connections | | ||
|`crowdstrike.object_id` | `keyword` | The identifier of a vertex | | ||
|`crowdstrike.operation_name` | `keyword` | Operation name | | ||
|`crowdstrike.pattern_id` | `keyword` | Identifies the pattern used for the detection | | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1033,6 +1033,63 @@ In this section, you will find examples of raw logs as generated natively by the | |
|
||
|
||
|
||
=== "mobile_detection_network_connections" | ||
|
||
|
||
```json | ||
{ | ||
"metadata": { | ||
"customerIDString": "0123456789ABCDEFGHIJKLMNOPQRSTUV", | ||
"offset": 13896542, | ||
"eventType": "MobileDetectionSummaryEvent", | ||
"eventCreationTime": 1722754343000, | ||
"version": "1.0" | ||
}, | ||
"event": { | ||
"SensorId": "85ae98xxxxxxd9a8f2", | ||
"MobileDetectionId": 2, | ||
"ComputerName": "host", | ||
"UserName": "[email protected]", | ||
"ContextTimeStamp": 1722754273, | ||
"DetectId": "0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2", | ||
"DetectName": "CkbSensorDetectDomainHighUI", | ||
"DetectDescription": "A domain lookup matched a CrowdStrike Intelligence indicator that has previously been used in targeted attacks.", | ||
"Tactic": "Falcon Intel", | ||
"TacticId": "CSTA0008", | ||
"Technique": "Intelligence Indicator - Domain", | ||
"TechniqueId": "CST0023", | ||
"Objective": "Falcon Detection Method", | ||
"Severity": 70, | ||
"FalconHostLink": "https://falcon.eu-1.crowdstrike.com/mobile/detections/0123456789ABCDEFGHIJKLMNOPQRSTUV:ind:85ae98xxxxxxd9a8f2:41104|2?_cid=0123456789ABCDEFGHIJKLMNOPQRSTUV", | ||
"MobileNetworkConnections": [ | ||
{ | ||
"AccessTimestamp": 1722754273, | ||
"Protocol": "6", | ||
"ConnectionFlags": 0, | ||
"LocalAddress": "", | ||
"RemoteAddress": "1.2.3.4", | ||
"RemotePort": 1, | ||
"ConnectionDirection": 0, | ||
"Url": "https://crowdstrike.test.com/integration", | ||
"IsIPV6": false, | ||
"ContextProcessId": 17793441978049446000 | ||
} | ||
], | ||
"ApplicationName": ".com.google.chrome.ios", | ||
"NetworkDetectionType": "prevented", | ||
"SourceVendors": "CrowdStrike", | ||
"SourceProducts": "Falcon for Mobile", | ||
"DataDomains": "Endpoint", | ||
"PatternId": 41124, | ||
"CompositeId": "7da61e27e34f4b8394081896af72e2c7:ind:2250689c5d8e43ccad2f5a7b56bced5b:41124|2", | ||
"Name": "CkbSensorDetectDomainHighUI", | ||
"Description": "A domain lookup matched a CrowdStrike Intelligence indicator that has previously been used in targeted attacks." | ||
} | ||
} | ||
``` | ||
|
||
|
||
|
||
=== "mobile_detection_summary_1" | ||
|
||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.