mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Add STUN, TDS, WireGuard, and ICS/SCADA dashboard queries
This commit is contained in:
@@ -1667,18 +1667,66 @@ soc:
|
|||||||
- name: SSL
|
- name: SSL
|
||||||
description: SSL logs
|
description: SSL logs
|
||||||
query: 'event.dataset:ssl | groupby ssl.version | groupby ssl.validation_status | groupby ssl.server_name | groupby ssl.certificate.issuer | groupby ssl.certificate.subject | groupby source.ip | groupby destination.ip | groupby destination.port'
|
query: 'event.dataset:ssl | groupby ssl.version | groupby ssl.validation_status | groupby ssl.server_name | groupby ssl.certificate.issuer | groupby ssl.certificate.subject | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: STUN
|
||||||
|
description: STUN (Session Traversal Utilities for NAT) network metadata
|
||||||
|
query: 'event.dataset:stun* | groupby -sankey source.ip destination.ip | groupby destination.geo.country_name | groupby source.ip | groupby destination.ip | groupby destination.port | groupby event.dataset'
|
||||||
- name: SYSLOG
|
- name: SYSLOG
|
||||||
description: SYSLOG logs
|
description: SYSLOG logs
|
||||||
query: 'event.dataset:syslog | groupby syslog.severity_label | groupby syslog.facility_label | groupby network.protocol | groupby source.ip | groupby destination.ip | groupby destination.port'
|
query: 'event.dataset:syslog | groupby syslog.severity_label | groupby syslog.facility_label | groupby network.protocol | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: TDS
|
||||||
|
description: TDS (Tabular Data Stream) network metadata
|
||||||
|
query: 'event.dataset:tds* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby tds.command | groupby tds.header_type | groupbytds.procedure_name | groupby source.ip | groupby destination.ip | groupby destination.port | groupby tds.query'
|
||||||
- name: Tunnel
|
- name: Tunnel
|
||||||
description: Tunnels seen by Zeek
|
description: Tunnels seen by Zeek
|
||||||
query: 'event.dataset:tunnel | groupby tunnel.type | groupby event.action | groupby source.ip | groupby destination.ip | groupby destination.port'
|
query: 'event.dataset:tunnel | groupby tunnel.type | groupby event.action | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
- name: Weird
|
- name: Weird
|
||||||
description: Weird network traffic seen by Zeek
|
description: Weird network traffic seen by Zeek
|
||||||
query: 'event.dataset:weird | groupby weird.name | groupby weird.additional_info | groupby source.ip | groupby destination.ip | groupby destination.port '
|
query: 'event.dataset:weird | groupby weird.name | groupby weird.additional_info | groupby source.ip | groupby destination.ip | groupby destination.port '
|
||||||
|
- name: TDS
|
||||||
|
description: TDS (Tabular Data Stream) network metadata
|
||||||
|
query: 'event.dataset:tds* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby tds.command | groupby tds.header_type | groupbytds.procedure_name | groupby source.ip | groupby destination.ip | groupby destination.port | groupby tds.query'
|
||||||
|
- name: WireGuard
|
||||||
|
description: WireGuard VPN network metadata
|
||||||
|
query: 'event.dataset:wireguard | groupby -sankey source.ip destination.ip | groupby destination.geo.country_name | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
- name: x509
|
- name: x509
|
||||||
description: x.509 certificates seen by Zeek
|
description: x.509 certificates seen by Zeek
|
||||||
query: 'event.dataset:x509 | groupby x509.certificate.key.length | groupby x509.san_dns | groupby x509.certificate.key.type | groupby x509.certificate.subject | groupby x509.certificate.issuer'
|
query: 'event.dataset:x509 | groupby x509.certificate.key.length | groupby x509.san_dns | groupby x509.certificate.key.type | groupby x509.certificate.subject | groupby x509.certificate.issuer'
|
||||||
|
- name: ICS Overview
|
||||||
|
description: Overview of ICS (Industrial Control Systems) network metadata
|
||||||
|
query: 'tags:ics | groupby event.dataset | groupby -sankey source.ip destination.ip | groupby source.ip | groupby destination.ip | groupby destination.port | groupby source.mac | groupby destination.mac'
|
||||||
|
- name: ICS BACnet
|
||||||
|
description: BACnet (Building Automation and Control Networks) network metadata
|
||||||
|
query: 'event.dataset:bacnet* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS BSAP
|
||||||
|
description: BSAP (Bristol Standard Asynchronous Protocol) network metadata
|
||||||
|
query: 'event.dataset:bsap* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS CIP
|
||||||
|
description: CIP (Common Industrial Protocol) network metadata
|
||||||
|
query: 'event.dataset:cip* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS COTP
|
||||||
|
description: COTP (Connection Oriented Transport Protocol) network metadata
|
||||||
|
query: 'event.dataset:cotp* | groupby -sankey source.ip destination.ip | groupby cotp.pdu.name | groupby cotp.pdu.code | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS DNP3
|
||||||
|
description: DNP3 (Distributed Network Protocol) network metadata
|
||||||
|
query: 'event.dataset:dnp3* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby dnp3.function_code | groupby dnp3.object_type | groupby dnp3.fc_request | groupby dnp3.fc_reply | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS ECAT
|
||||||
|
description: ECAT (Ethernet for Control Automation Technology) network metadata
|
||||||
|
query: 'event.dataset:ecat* | groupby -sankey event.dataset source.mac destination.mac | groupby event.dataset | groupby source.mac | groupby destination.mac | groupby ecat.command | groupby ecat.register.type'
|
||||||
|
- name: ICS ENIP
|
||||||
|
description: ENIP (Ethernet Industrial Protocol) network metadata
|
||||||
|
query: 'event.dataset:enip* | groupby -sankey source.ip destination.ip | groupby enip.command | groupby enip.status_code | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS Modbus
|
||||||
|
description: Modbus network metadata
|
||||||
|
query: 'event.dataset:modbus* | groupby -sankey event.dataset modbus.function | groupby event.dataset | groupby modbus.function | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS OPC UA
|
||||||
|
description: OPC UA (Unified Architecture) network metadata
|
||||||
|
query: 'event.dataset:opcua* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS Profinet
|
||||||
|
description: Profinet (Process Field Network) network metadata
|
||||||
|
query: 'event.dataset:profinet* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
- name: ICS S7
|
||||||
|
description: S7 (Siemens) network metadata
|
||||||
|
query: 'event.dataset:s7* | groupby -sankey event.dataset source.ip destination.ip | groupby event.dataset | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
- name: Firewall
|
- name: Firewall
|
||||||
description: Firewall logs
|
description: Firewall logs
|
||||||
query: 'event.dataset:firewall | groupby rule.action | groupby interface.name | groupby network.transport | groupby source.ip | groupby destination.ip | groupby destination.port'
|
query: 'event.dataset:firewall | groupby rule.action | groupby interface.name | groupby network.transport | groupby source.ip | groupby destination.ip | groupby destination.port'
|
||||||
|
|||||||
Reference in New Issue
Block a user