Skip to content

Commit 8b4fa90

Browse files
committed
Upgrade ECS to 8.0.0
1 parent 2aa502e commit 8b4fa90

File tree

8 files changed

+195
-146
lines changed

8 files changed

+195
-146
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
dependencies:
22
ecs:
3-
reference: git@1.12
3+
reference: git@8.0

packages/microsoft_defender_endpoint/_dev/build/docs/README.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,6 @@ These values are:
3838
| id | event.id |
3939
| lastEventTime | event.end |
4040
| machineId | cloud.instance.id |
41-
| relatedUser.userName | host.user.name |
42-
| relatedUser.domainName | host.user.domain |
4341
| title | message |
4442
| severity | event.severity |
4543

packages/microsoft_defender_endpoint/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "2.0.0"
3+
changes:
4+
- description: Update to ECS 8.0
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/2422
27
- version: "1.1.0"
38
changes:
49
- description: Add 8.0.0 version constraint

packages/microsoft_defender_endpoint/data_stream/log/_dev/test/pipeline/test-defenderatp.log-expected.json

Lines changed: 8 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
"path": "C:\\Windows\\Temp\\sb-sim-temp-ikyxqi\\sb_10554_bs_h4qpk5"
4242
},
4343
"ecs": {
44-
"version": "1.12.0"
44+
"version": "8.0.0"
4545
},
4646
"related": {
4747
"hosts": [
@@ -69,7 +69,7 @@
6969
"end"
7070
],
7171
"duration": 0,
72-
"ingested": "2021-06-09T11:57:25.803509100Z",
72+
"ingested": "2022-01-02T01:28:49.601370210Z",
7373
"provider": "defender_endpoint",
7474
"action": "Malware",
7575
"end": "2020-06-30T10:07:44.333733Z",
@@ -132,7 +132,7 @@
132132
}
133133
},
134134
"ecs": {
135-
"version": "1.12.0"
135+
"version": "8.0.0"
136136
},
137137
"related": {
138138
"user": [
@@ -148,10 +148,6 @@
148148
},
149149
"host": {
150150
"name": "testserver4",
151-
"user": {
152-
"name": "administrator1",
153-
"domain": "TestServer4"
154-
},
155151
"hostname": "testserver4"
156152
},
157153
"threat": {
@@ -172,7 +168,7 @@
172168
"start"
173169
],
174170
"duration": 2442699369800,
175-
"ingested": "2021-06-09T11:57:25.803531Z",
171+
"ingested": "2022-01-02T01:28:49.601372227Z",
176172
"provider": "defender_endpoint",
177173
"action": "DefenseEvasion",
178174
"end": "2020-06-30T09:45:39.5484377Z",
@@ -224,7 +220,7 @@
224220
"vendor": "Microsoft"
225221
},
226222
"ecs": {
227-
"version": "1.12.0"
223+
"version": "8.0.0"
228224
},
229225
"related": {
230226
"user": [
@@ -236,11 +232,6 @@
236232
},
237233
"host": {
238234
"name": "testserver4",
239-
"user": {
240-
"name": "administrator1",
241-
"domain": "TestServer4",
242-
"id": "S-1-5-21-46152456-1367606905-4031241297-500"
243-
},
244235
"hostname": "testserver4"
245236
},
246237
"threat": {
@@ -262,7 +253,7 @@
262253
"start"
263254
],
264255
"duration": 2442699369800,
265-
"ingested": "2021-06-09T11:57:25.803537900Z",
256+
"ingested": "2022-01-02T01:28:49.601373311Z",
266257
"provider": "defender_endpoint",
267258
"action": "DefenseEvasion",
268259
"end": "2020-06-30T09:45:39.5484377Z",
@@ -321,7 +312,7 @@
321312
}
322313
},
323314
"ecs": {
324-
"version": "1.12.0"
315+
"version": "8.0.0"
325316
},
326317
"related": {
327318
"hosts": [
@@ -353,7 +344,7 @@
353344
"end"
354345
],
355346
"duration": 892514711800,
356-
"ingested": "2021-06-09T11:57:25.803543400Z",
347+
"ingested": "2022-01-02T01:28:49.601374271Z",
357348
"provider": "defender_endpoint",
358349
"action": "Malware",
359350
"end": "2020-06-30T09:46:15.0876676Z",

packages/microsoft_defender_endpoint/data_stream/log/elasticsearch/ingest_pipeline/default.yml

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ processors:
66
value: '{{_ingest.timestamp}}'
77
- set:
88
field: ecs.version
9-
value: '1.12.0'
9+
value: '8.0.0'
1010
- rename:
1111
field: message
1212
target_field: event.original
@@ -272,23 +272,6 @@ processors:
272272
target_field: user.id
273273
ignore_missing: true
274274

275-
##############################
276-
## ECS host.user Mapping ##
277-
## Deprecated since ECS 1.8 ##
278-
##############################
279-
- set:
280-
field: host.user.name
281-
value: '{{user.name}}'
282-
ignore_empty_value: true
283-
- set:
284-
field: host.user.domain
285-
value: '{{user.domain}}'
286-
ignore_empty_value: true
287-
- set:
288-
field: host.user.id
289-
value: '{{user.id}}'
290-
ignore_empty_value: true
291-
292275
#########################
293276
## ECS Related Mapping ##
294277
#########################
Lines changed: 89 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,73 +1,110 @@
11
{
2-
"rule": {
3-
"description": "Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.\n\nA malware is considered active if it is found running on the machine or it already has persistence mechanisms in place. Active malware detections are assigned higher severity ratings.\n\nBecause this malware was active, take precautionary measures and check for residual signs of infection."
4-
},
5-
"message": "An active 'Exeselrun' malware was detected",
6-
"microsoft": {
7-
"defender_endpoint": {
8-
"investigationId": "9",
9-
"evidence": {
10-
"entityType": "File"
11-
},
12-
"resolvedTime": "2020-06-30T11:13:12.2680434Z",
13-
"investigationState": "Benign",
14-
"incidentId": "12",
15-
"assignedTo": "elastic@elasticuser.com",
16-
"lastUpdateTime": "2020-07-03T15:15:39.13Z",
17-
"status": "Resolved"
18-
}
2+
"@timestamp": "2022-01-02T01:30:05.670Z",
3+
"agent": {
4+
"ephemeral_id": "9cc31363-7ffb-4763-9bec-cef372647d15",
5+
"id": "b1d83907-ff3e-464a-b79a-cf843f6f0bba",
6+
"name": "docker-fleet-agent",
7+
"type": "filebeat",
8+
"version": "8.0.0-beta1"
199
},
2010
"cloud": {
21-
"provider": "azure",
2211
"account": {
23-
"id": "123543-d66c-4c7e-9e30-40034eb7c6f3"
12+
"id": "a839b112-1253-6432-9bf6-94542403f21c"
2413
},
2514
"instance": {
26-
"id": "c5a964f417c11f6277d5bf9489f0d"
15+
"id": "111e6dd8c833c8a052ea231ec1b19adaf497b625"
16+
},
17+
"provider": "azure"
18+
},
19+
"data_stream": {
20+
"dataset": "microsoft_defender_endpoint.log",
21+
"namespace": "ep",
22+
"type": "logs"
23+
},
24+
"ecs": {
25+
"version": "8.0.0"
26+
},
27+
"elastic_agent": {
28+
"id": "b1d83907-ff3e-464a-b79a-cf843f6f0bba",
29+
"snapshot": false,
30+
"version": "8.0.0-beta1"
31+
},
32+
"event": {
33+
"action": "Execution",
34+
"agent_id_status": "verified",
35+
"category": [
36+
"host"
37+
],
38+
"created": "2021-01-26T20:33:57.7220239Z",
39+
"dataset": "microsoft_defender_endpoint.log",
40+
"duration": 101466100,
41+
"end": "2021-01-26T20:31:33.0577322Z",
42+
"id": "da637472900382838869_1364969609",
43+
"ingested": "2022-01-02T01:30:06Z",
44+
"kind": "alert",
45+
"provider": "defender_endpoint",
46+
"severity": 2,
47+
"start": "2021-01-26T20:31:32.9562661Z",
48+
"timezone": "UTC",
49+
"type": [
50+
"user",
51+
"creation",
52+
"start"
53+
]
54+
},
55+
"host": {
56+
"hostname": "temp123.middleeast.corp.microsoft.com",
57+
"name": "temp123.middleeast.corp.microsoft.com"
58+
},
59+
"input": {
60+
"type": "httpjson"
61+
},
62+
"message": "Low-reputation arbitrary code executed by signed executable",
63+
"microsoft": {
64+
"defender_endpoint": {
65+
"evidence": {
66+
"aadUserId": "11118379-2a59-1111-ac3c-a51eb4a3c627",
67+
"accountName": "name",
68+
"domainName": "DOMAIN",
69+
"entityType": "User",
70+
"userPrincipalName": "temp123@microsoft.com"
71+
},
72+
"incidentId": "1126093",
73+
"investigationState": "Queued",
74+
"lastUpdateTime": "2021-01-26T20:33:59.2Z",
75+
"rbacGroupName": "A",
76+
"status": "New"
2777
}
2878
},
2979
"observer": {
30-
"name": "WindowsDefenderAv",
31-
"product": "Defender ATP",
80+
"name": "WindowsDefenderAtp",
81+
"product": "Defender for Endpoint",
3282
"vendor": "Microsoft"
3383
},
34-
"file": {
35-
"name": "SB.xsl",
36-
"path": "C:\\Windows\\Temp\\sb-sim-temp-ikyxqi\\sb_10554_bs_h4qpk5"
37-
},
3884
"related": {
3985
"hosts": [
40-
"testserver4"
86+
"temp123.middleeast.corp.microsoft.com"
87+
],
88+
"user": [
89+
"temp123"
4190
]
4291
},
43-
"host": {
44-
"name": "testserver4",
45-
"hostname": "testserver4"
92+
"rule": {
93+
"description": "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C\u0026C) server."
4694
},
95+
"tags": [
96+
"microsoft-defender-endpoint",
97+
"forwarded"
98+
],
4799
"threat": {
100+
"framework": "MITRE ATT\u0026CK",
48101
"technique": {
49-
"name": "Malware"
50-
},
51-
"framework": "MITRE ATT\u0026CK"
102+
"name": "Execution"
103+
}
52104
},
53-
"event": {
54-
"severity": 2,
55-
"kind": "alert",
56-
"timezone": "UTC",
57-
"created": "2020-06-30T10:09:01.1569718Z",
58-
"start": "2020-06-30T10:07:44.333733Z",
59-
"type": [
60-
"end"
61-
],
62-
"duration": 0,
63-
"ingested": "2021-02-18T13:34:35.126958300Z",
64-
"provider": "defender_endpoint",
65-
"action": "Malware",
66-
"end": "2020-06-30T10:07:44.333733Z",
67-
"id": "da637291085411733957_-1043898914",
68-
"category": [
69-
"host",
70-
"malware"
71-
]
105+
"user": {
106+
"domain": "DOMAIN",
107+
"id": "S-1-5-21-11111607-1111760036-109187956-75141",
108+
"name": "temp123"
72109
}
73110
}

0 commit comments

Comments
 (0)