mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-05-04 10:28:16 +02:00
Merge remote-tracking branch 'origin/2.4/dev' into vlb2
This commit is contained in:
@@ -52,6 +52,13 @@ socsaltdir:
|
||||
- mode: 770
|
||||
- makedirs: True
|
||||
|
||||
socplaybooksdir:
|
||||
file.directory:
|
||||
- name: /opt/so/conf/soc/playbooks
|
||||
- user: 939
|
||||
- group: 939
|
||||
- makedirs: True
|
||||
|
||||
socanalytics:
|
||||
file.managed:
|
||||
- name: /opt/so/conf/soc/analytics.js
|
||||
|
||||
@@ -1415,17 +1415,21 @@ soc:
|
||||
license: Elastic-2.0
|
||||
folder: sigma/stable
|
||||
community: true
|
||||
rulesetName: securityonion-resources
|
||||
- repo: file:///nsm/rules/custom-local-repos/local-sigma
|
||||
license: Elastic-2.0
|
||||
community: false
|
||||
rulesetName: local-sigma
|
||||
airgap:
|
||||
- repo: file:///nsm/rules/detect-sigma/repos/securityonion-resources
|
||||
license: Elastic-2.0
|
||||
folder: sigma/stable
|
||||
community: true
|
||||
rulesetName: securityonion-resources
|
||||
- repo: file:///nsm/rules/custom-local-repos/local-sigma
|
||||
license: Elastic-2.0
|
||||
community: false
|
||||
rulesetName: local-sigma
|
||||
sigmaRulePackages:
|
||||
- core
|
||||
- emerging_threats_addon
|
||||
@@ -1500,16 +1504,20 @@ soc:
|
||||
- repo: https://github.com/Security-Onion-Solutions/securityonion-yara
|
||||
license: DRL
|
||||
community: true
|
||||
rulesetName: securityonion-yara
|
||||
- repo: file:///nsm/rules/custom-local-repos/local-yara
|
||||
license: Elastic-2.0
|
||||
community: false
|
||||
rulesetName: local-yara
|
||||
airgap:
|
||||
- repo: file:///nsm/rules/detect-yara/repos/securityonion-yara
|
||||
license: DRL
|
||||
community: true
|
||||
rulesetName: securityonion-yara
|
||||
- repo: file:///nsm/rules/custom-local-repos/local-yara
|
||||
license: Elastic-2.0
|
||||
community: false
|
||||
rulesetName: local-yara
|
||||
yaraRulesFolder: /opt/sensoroni/yara/rules
|
||||
stateFilePath: /opt/sensoroni/fingerprints/strelkaengine.state
|
||||
integrityCheckFrequencySeconds: 1200
|
||||
|
||||
@@ -1,45 +1,6 @@
|
||||
name: Security Onion Baseline Pipeline
|
||||
priority: 90
|
||||
transformations:
|
||||
vars:
|
||||
document_id:
|
||||
- '{soc_id}'
|
||||
hostname:
|
||||
- '{event_data.host.name}'
|
||||
ProcessGuid:
|
||||
- '{event_data.process.entity_id}'
|
||||
User:
|
||||
- '{user.name}'
|
||||
private_ip:
|
||||
- '{network.private.ip}'
|
||||
public_ip:
|
||||
- '{network.public.ip}'
|
||||
related_ip:
|
||||
- '{event_data.related.ip}'
|
||||
related.hosts:
|
||||
- '{event_data.related.hosts'
|
||||
CurrentDirectory:
|
||||
- '{event_data.process.working_directory}'
|
||||
ParentProcessGuid:
|
||||
- '{ParentProcessGuid}'
|
||||
Image:
|
||||
- '{process.executable}'
|
||||
community_id:
|
||||
- '{network.community_id}'
|
||||
transformations:
|
||||
- type: value_placeholders
|
||||
include:
|
||||
- 'community_id'
|
||||
- 'document_id'
|
||||
- 'ProcessGuid'
|
||||
- 'hostname'
|
||||
- 'User'
|
||||
- 'CurrentDirectory'
|
||||
- 'ParentProcessGuid'
|
||||
- 'Image'
|
||||
- 'related_ip'
|
||||
- 'private_ip'
|
||||
- 'public_ip'
|
||||
- id: baseline_field_name_mapping
|
||||
type: field_name_mapping
|
||||
mapping:
|
||||
@@ -64,14 +25,17 @@ transformations:
|
||||
CommandLine: process.command_line
|
||||
CurrentDirectory: process.working_directory
|
||||
ParentProcessGuid: process.parent.entity_id
|
||||
ParentProcessId: process.parent.pid"
|
||||
ParentProcessId: process.parent.pid
|
||||
ParentImage: process.parent.executable
|
||||
ParentCommandLine: process.parent.command_line
|
||||
User: user.name
|
||||
## End Temp Linux Mappings ##
|
||||
document_id: _id
|
||||
rule.type: event.module
|
||||
related_ip: related.ip
|
||||
community_id: network.community_id
|
||||
event_dataset: event.dataset
|
||||
hostname: host.name
|
||||
# Maps "opencanary" product to SO IDH logs
|
||||
- id: opencanary_idh_add-fields
|
||||
type: add_condition
|
||||
@@ -181,7 +145,15 @@ transformations:
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: file_event
|
||||
category: file_event
|
||||
# Maps network rules to all network logs
|
||||
# This targets all network logs, all services, generated from endpoints and network
|
||||
- id: network_add-fields
|
||||
type: add_condition
|
||||
conditions:
|
||||
event.category: 'network'
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: network
|
||||
# Maps network_connection rules to endpoint network creation logs
|
||||
# This is an OS-agnostic mapping, to account for logs that don't specify source OS
|
||||
- id: endpoint_network_connection_add-fields
|
||||
@@ -218,3 +190,41 @@ transformations:
|
||||
- type: logsource
|
||||
category: network
|
||||
service: dns
|
||||
# Maps "network + file" to SO file logs
|
||||
- id: network_file_so_add-fields
|
||||
type: add_condition
|
||||
conditions:
|
||||
event.category: 'network'
|
||||
tags: 'file'
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: network
|
||||
service: file
|
||||
# Maps "network + x509" to SO x509 logs
|
||||
- id: network_x509_so_add-fields
|
||||
type: add_condition
|
||||
conditions:
|
||||
event.category: 'network'
|
||||
tags: 'x509'
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: network
|
||||
service: x509
|
||||
# Maps "network + ssl" to SO ssl logs
|
||||
- id: network_ssl_so_add-fields
|
||||
type: add_condition
|
||||
conditions:
|
||||
event.category: 'network'
|
||||
tags: 'ssl'
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: network
|
||||
service: ssl
|
||||
# Maps file to host or network file events
|
||||
- id: file_so_add-fields
|
||||
type: add_condition
|
||||
conditions:
|
||||
tags: '*file'
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: file
|
||||
+35
-1
@@ -344,6 +344,23 @@ soc:
|
||||
advanced: True
|
||||
forcedType: "[]{}"
|
||||
helpLink: sigma.html
|
||||
syntax: json
|
||||
uiElements:
|
||||
- field: rulesetName
|
||||
label: Ruleset Name
|
||||
- field: repo
|
||||
label: Repo URL
|
||||
required: True
|
||||
- field: branch
|
||||
label: Branch
|
||||
- field: license
|
||||
label: License
|
||||
required: True
|
||||
- field: folder
|
||||
label: Folder
|
||||
- field: community
|
||||
label: Community
|
||||
forcedType: bool
|
||||
airgap: *eerulesRepos
|
||||
sigmaRulePackages:
|
||||
description: 'Defines the Sigma Community Ruleset you want to run. One of these (core | core+ | core++ | all ) as well as an optional Add-on (emerging_threats_addon). Once you have changed the ruleset here, the new settings will be applied within 15 minutes. At that point, you will need to wait for the scheduled rule update to take place (by default, every 24 hours), or you can force the update by nagivating to Detections --> Options dropdown menu --> Elastalert --> Full Update. WARNING! Changing the ruleset will remove all existing non-overlapping Sigma rules of the previous ruleset and their associated overrides. This removal cannot be undone.'
|
||||
@@ -459,6 +476,23 @@ soc:
|
||||
advanced: True
|
||||
forcedType: "[]{}"
|
||||
helpLink: yara.html
|
||||
syntax: json
|
||||
uiElements:
|
||||
- field: rulesetName
|
||||
label: Ruleset Name
|
||||
- field: repo
|
||||
label: Repo URL
|
||||
required: True
|
||||
- field: branch
|
||||
label: Branch
|
||||
- field: license
|
||||
label: License
|
||||
required: True
|
||||
- field: folder
|
||||
label: Folder
|
||||
- field: community
|
||||
label: Community
|
||||
forcedType: bool
|
||||
airgap: *serulesRepos
|
||||
suricataengine:
|
||||
aiRepoUrl:
|
||||
@@ -592,7 +626,7 @@ soc:
|
||||
label: Query
|
||||
required: True
|
||||
- field: showSubtitle
|
||||
label: Show Query in Dropdown.
|
||||
label: Show Query in Dropdown.
|
||||
forcedType: bool
|
||||
queryToggleFilters:
|
||||
description: Customize togglable query filters that apply to all queries. Exclusive toggles will invert the filter if toggled off rather than omitting the filter from the query.
|
||||
|
||||
Reference in New Issue
Block a user