Skip to content

Commit

Permalink
Merge branch 'main' into fix/CybereasonConnector
Browse files Browse the repository at this point in the history
  • Loading branch information
squioc authored Dec 3, 2024
2 parents 9daca27 + abb3af3 commit 0f1498c
Show file tree
Hide file tree
Showing 21 changed files with 811 additions and 0 deletions.
8 changes: 8 additions & 0 deletions SentinelOne/identity/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Changelog

All notable changes to this project will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [Unreleased]
39 changes: 39 additions & 0 deletions SentinelOne/identity/_meta/fields.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
sentinelone.identity.attackSurfaces:
description: ''
name: sentinelone.identity.attackSurfaces
type: keyword

sentinelone.identity.classification:
description: ''
name: sentinelone.identity.classification
type: keyword

sentinelone.identity.confidenceLevel:
description: ''
name: sentinelone.identity.confidenceLevel
type: keyword

sentinelone.identity.id:
description: ''
name: sentinelone.identity.id
type: keyword

sentinelone.identity.name:
description: ''
name: sentinelone.identity.name
type: keyword

sentinelone.identity.result:
description: ''
name: sentinelone.identity.result
type: keyword

sentinelone.identity.status:
description: ''
name: sentinelone.identity.status
type: keyword

sentinelone.identity.storyLineId:
description: ''
name: sentinelone.identity.storyLineId
type: keyword
Binary file added SentinelOne/identity/_meta/logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
11 changes: 11 additions & 0 deletions SentinelOne/identity/_meta/manifest.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
uuid: b502e522-6996-4b12-9538-f69326b68243
name: SentinelOne Singularity Identity [ALPHA]
slug: sentinelone-singularity-identity
automation_connector_uuid: 2d772558-821d-4663-87bd-af28bbb8415a
automation_module_uuid: ff675e74-e5c1-47c8-a571-d207fc297464

description: >-
SentinelOne Singularity Identity is a cybersecurity solution that provides identity protection and zero-trust security by continuously monitoring and analyzing user behaviors to detect and prevent potential threats.
data_sources:
Application logs: activites performed on SentinelOne infrastructure are logged
46 changes: 46 additions & 0 deletions SentinelOne/identity/_meta/smart-descriptions.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
[
{
"value": "Alert defined {sentinelone.identity.name} with status {sentinelone.identity.status} on {process.command_line}",
"conditions": [
{
"field": "sentinelone.identity.name"
},
{
"field": "sentinelone.identity.status"
},
{
"field": "process.command_line"
}
]
},
{
"value": "Alert defined {sentinelone.identity.name} with status {sentinelone.identity.status}",
"conditions": [
{
"field": "sentinelone.identity.name"
},
{
"field": "sentinelone.identity.status"
}
]
},
{
"value": "Alert defined {sentinelone.identity.name} on {process.command_line}",
"conditions": [
{
"field": "sentinelone.identity.name"
},
{
"field": "process.command_line"
}
]
},
{
"value": "Alert defined {sentinelone.identity.name}",
"conditions": [
{
"field": "sentinelone.identity.name"
}
]
}
]
67 changes: 67 additions & 0 deletions SentinelOne/identity/ingest/parser.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
name: identity
pipeline:
- name: json_event
external:
name: json.parse-json
properties:
input_field: "{{original.message}}"

- name: detected_at
filter: "{{json_event.message.detectedAt != null}}"
external:
name: date.parse
properties:
input_field: "{{json_event.message.detectedAt}}"
output_field: timestamp

- name: started_at
filter: "{{json_event.message.firstSeenAt != null}}"
external:
name: date.parse
properties:
input_field: "{{json_event.message.firstSeenAt}}"
output_field: timestamp

- name: last_seen_at
filter: "{{json_event.message.lastSeenAt != null}}"
external:
name: date.parse
properties:
input_field: "{{json_event.message.lastSeenAt}}"
output_field: timestamp

- name: set_meta_fields
stages:
set_meta_fields:
actions:
- set:
event.kind: "alert"
event.category: "intrusion_detection"
event.type: "info"
observer.vendor: "SentinelOne"
observer.product: "Singularity Identity"

"@timestamp": "{{detected_at.timestamp}}"
event.start: "{{started_at.timestamp}}"
event.end: "{{last_seen_at.timestamp}}"

event.provider: "{{json_event.message.detectionSource.product}}"
event.reason: "{{json_event.message.description}}"

process.command_line: "{{json_event.message.process.cmdLine}}"
process.parent.name: "{{json_event.message.process.parentName}}"

process.executable: "{{json_event.message.process.file.path}}"
process.name: "{{json_event.message.process.file.path | basename}}"
process.hash.sha1: "{{json_event.message.process.file.sha1}}"
process.hash.sha256: "{{json_event.message.process.file.sha256}}"
process.hash.md5: "{{json_event.message.process.file.md5}}"

sentinelone.identity.id: "{{json_event.message.id}}"
sentinelone.identity.name: "{{json_event.message.name}}"
sentinelone.identity.attackSurfaces: "{{json_event.message.attackSurfaces}}"
sentinelone.identity.status: "{{json_event.message.status}}"
sentinelone.identity.classification: "{{json_event.message.classification}}"
sentinelone.identity.confidenceLevel: "{{json_event.message.confidenceLevel}}"
sentinelone.identity.result: "{{json_event.message.result}}"
sentinelone.identity.storyLineId: "{{json_event.message.storyLineId}}"
47 changes: 47 additions & 0 deletions SentinelOne/identity/tests/test_alert_1.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"input": {
"message": "{\n \"id\": \"ba485919-e4c1-4496-9e2f-feb320f6841a\",\n \"name\": \"Domain Controller Discovery Detected\",\n \"description\": \"This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.\",\n \"detectedAt\": \"2024-11-22T05:35:09.000Z\",\n \"attackSurfaces\": [\n \"IDENTITY\"\n ],\n \"detectionSource\": {\n \"product\": \"Identity\"\n },\n \"status\": \"NEW\",\n \"assignee\": null,\n \"classification\": \"ENUMERATION\",\n \"confidenceLevel\": \"MALICIOUS\",\n \"firstSeenAt\": \"2024-11-22T05:35:09.000Z\",\n \"lastSeenAt\": \"2024-11-22T05:35:09.000Z\",\n \"process\": {\n \"cmdLine\": \"C:\\\\Windows\\\\system32\\\\net1 group \\\"Domain Controllers\\\" /domain\",\n \"file\": {\n \"path\": \"c:\\\\windows\\\\system32\\\\net1.exe\",\n \"sha1\": null,\n \"sha256\": \"18F76BC1F02A161EBDEDF3142273C186D05A836ADDCAAEE599194089FD59F398\",\n \"md5\": null\n },\n \"parentName\": null\n },\n \"result\": null,\n \"storylineId\": null\n}"
},
"expected": {
"message": "{\n \"id\": \"ba485919-e4c1-4496-9e2f-feb320f6841a\",\n \"name\": \"Domain Controller Discovery Detected\",\n \"description\": \"This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.\",\n \"detectedAt\": \"2024-11-22T05:35:09.000Z\",\n \"attackSurfaces\": [\n \"IDENTITY\"\n ],\n \"detectionSource\": {\n \"product\": \"Identity\"\n },\n \"status\": \"NEW\",\n \"assignee\": null,\n \"classification\": \"ENUMERATION\",\n \"confidenceLevel\": \"MALICIOUS\",\n \"firstSeenAt\": \"2024-11-22T05:35:09.000Z\",\n \"lastSeenAt\": \"2024-11-22T05:35:09.000Z\",\n \"process\": {\n \"cmdLine\": \"C:\\\\Windows\\\\system32\\\\net1 group \\\"Domain Controllers\\\" /domain\",\n \"file\": {\n \"path\": \"c:\\\\windows\\\\system32\\\\net1.exe\",\n \"sha1\": null,\n \"sha256\": \"18F76BC1F02A161EBDEDF3142273C186D05A836ADDCAAEE599194089FD59F398\",\n \"md5\": null\n },\n \"parentName\": null\n },\n \"result\": null,\n \"storylineId\": null\n}",
"event": {
"category": "intrusion_detection",
"end": "2024-11-22T05:35:09Z",
"kind": "alert",
"provider": "Identity",
"reason": "This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.",
"start": "2024-11-22T05:35:09Z",
"type": "info"
},
"@timestamp": "2024-11-22T05:35:09Z",
"observer": {
"product": "Singularity Identity",
"vendor": "SentinelOne"
},
"process": {
"command_line": "C:\\Windows\\system32\\net1 group \"Domain Controllers\" /domain",
"executable": "c:\\windows\\system32\\net1.exe",
"hash": {
"sha256": "18F76BC1F02A161EBDEDF3142273C186D05A836ADDCAAEE599194089FD59F398"
},
"name": "net1.exe"
},
"related": {
"hash": [
"18F76BC1F02A161EBDEDF3142273C186D05A836ADDCAAEE599194089FD59F398"
]
},
"sentinelone": {
"identity": {
"attackSurfaces": [
"IDENTITY"
],
"classification": "ENUMERATION",
"confidenceLevel": "MALICIOUS",
"id": "ba485919-e4c1-4496-9e2f-feb320f6841a",
"name": "Domain Controller Discovery Detected",
"status": "NEW"
}
}
}
}
34 changes: 34 additions & 0 deletions SentinelOne/identity/tests/test_alert_10.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
{
"input": {
"message": "{\"id\": \"01935322-7b49-71f0-89e0-f52562c26e53\", \"name\": \"Brute force attack - Mass Account Lockout\", \"description\": \"This event is raised when ADAssessor detects lockout of multiple accounts, which could be due to brute-force attempts or a password spray.\", \"detectedAt\": \"2024-11-22T09:09:48.731Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"UNKNOWN\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T09:09:48.731Z\", \"lastSeenAt\": \"2024-11-22T09:09:48.731Z\", \"process\": null, \"result\": null, \"storylineId\": null}"
},
"expected": {
"message": "{\"id\": \"01935322-7b49-71f0-89e0-f52562c26e53\", \"name\": \"Brute force attack - Mass Account Lockout\", \"description\": \"This event is raised when ADAssessor detects lockout of multiple accounts, which could be due to brute-force attempts or a password spray.\", \"detectedAt\": \"2024-11-22T09:09:48.731Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"UNKNOWN\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T09:09:48.731Z\", \"lastSeenAt\": \"2024-11-22T09:09:48.731Z\", \"process\": null, \"result\": null, \"storylineId\": null}",
"event": {
"category": "intrusion_detection",
"end": "2024-11-22T09:09:48.731000Z",
"kind": "alert",
"provider": "Identity",
"reason": "This event is raised when ADAssessor detects lockout of multiple accounts, which could be due to brute-force attempts or a password spray.",
"start": "2024-11-22T09:09:48.731000Z",
"type": "info"
},
"@timestamp": "2024-11-22T09:09:48.731000Z",
"observer": {
"product": "Singularity Identity",
"vendor": "SentinelOne"
},
"sentinelone": {
"identity": {
"attackSurfaces": [
"IDENTITY"
],
"classification": "UNKNOWN",
"confidenceLevel": "MALICIOUS",
"id": "01935322-7b49-71f0-89e0-f52562c26e53",
"name": "Brute force attack - Mass Account Lockout",
"status": "NEW"
}
}
}
}
47 changes: 47 additions & 0 deletions SentinelOne/identity/tests/test_alert_11.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"input": {
"message": "{\"id\": \"01935310-d00e-7616-81b9-fcb227ebb13d\", \"name\": \"Domain Controller Discovery Detected\", \"description\": \"This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.\", \"detectedAt\": \"2024-11-22T08:45:51.000Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"ENUMERATION\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T08:45:51.000Z\", \"lastSeenAt\": \"2024-11-22T08:45:51.000Z\", \"process\": {\"cmdLine\": \"Sharphound.exe\", \"file\": {\"path\": \"c:\\\\users\\\\administrator\\\\desktop\\\\ad_recon\\\\sharphound.exe\", \"sha1\": null, \"sha256\": \"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863\", \"md5\": null}, \"parentName\": null}, \"result\": null, \"storylineId\": null}"
},
"expected": {
"message": "{\"id\": \"01935310-d00e-7616-81b9-fcb227ebb13d\", \"name\": \"Domain Controller Discovery Detected\", \"description\": \"This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.\", \"detectedAt\": \"2024-11-22T08:45:51.000Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"ENUMERATION\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T08:45:51.000Z\", \"lastSeenAt\": \"2024-11-22T08:45:51.000Z\", \"process\": {\"cmdLine\": \"Sharphound.exe\", \"file\": {\"path\": \"c:\\\\users\\\\administrator\\\\desktop\\\\ad_recon\\\\sharphound.exe\", \"sha1\": null, \"sha256\": \"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863\", \"md5\": null}, \"parentName\": null}, \"result\": null, \"storylineId\": null}",
"event": {
"category": "intrusion_detection",
"end": "2024-11-22T08:45:51Z",
"kind": "alert",
"provider": "Identity",
"reason": "This event is raised when there is a query from an endpoint to find the domain controllers or AD Servers in the Active Directory Domain.",
"start": "2024-11-22T08:45:51Z",
"type": "info"
},
"@timestamp": "2024-11-22T08:45:51Z",
"observer": {
"product": "Singularity Identity",
"vendor": "SentinelOne"
},
"process": {
"command_line": "Sharphound.exe",
"executable": "c:\\users\\administrator\\desktop\\ad_recon\\sharphound.exe",
"hash": {
"sha256": "61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863"
},
"name": "sharphound.exe"
},
"related": {
"hash": [
"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863"
]
},
"sentinelone": {
"identity": {
"attackSurfaces": [
"IDENTITY"
],
"classification": "ENUMERATION",
"confidenceLevel": "MALICIOUS",
"id": "01935310-d00e-7616-81b9-fcb227ebb13d",
"name": "Domain Controller Discovery Detected",
"status": "NEW"
}
}
}
}
47 changes: 47 additions & 0 deletions SentinelOne/identity/tests/test_alert_12.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"input": {
"message": "{\"id\": \"01935310-eb28-7a57-9c27-87843b2cec61\", \"name\": \"AD Service Account Enumeration Detected\", \"description\": \"This event is generated when LDAP queries for enumerating service accounts are detected from an endpoint.\", \"detectedAt\": \"2024-11-22T08:45:51.000Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"ENUMERATION\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T08:45:51.000Z\", \"lastSeenAt\": \"2024-11-22T08:45:51.000Z\", \"process\": {\"cmdLine\": \"Sharphound.exe\", \"file\": {\"path\": \"c:\\\\users\\\\administrator\\\\desktop\\\\ad_recon\\\\sharphound.exe\", \"sha1\": null, \"sha256\": \"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863\", \"md5\": null}, \"parentName\": null}, \"result\": null, \"storylineId\": null}"
},
"expected": {
"message": "{\"id\": \"01935310-eb28-7a57-9c27-87843b2cec61\", \"name\": \"AD Service Account Enumeration Detected\", \"description\": \"This event is generated when LDAP queries for enumerating service accounts are detected from an endpoint.\", \"detectedAt\": \"2024-11-22T08:45:51.000Z\", \"attackSurfaces\": [\"IDENTITY\"], \"detectionSource\": {\"product\": \"Identity\"}, \"status\": \"NEW\", \"assignee\": null, \"classification\": \"ENUMERATION\", \"confidenceLevel\": \"MALICIOUS\", \"firstSeenAt\": \"2024-11-22T08:45:51.000Z\", \"lastSeenAt\": \"2024-11-22T08:45:51.000Z\", \"process\": {\"cmdLine\": \"Sharphound.exe\", \"file\": {\"path\": \"c:\\\\users\\\\administrator\\\\desktop\\\\ad_recon\\\\sharphound.exe\", \"sha1\": null, \"sha256\": \"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863\", \"md5\": null}, \"parentName\": null}, \"result\": null, \"storylineId\": null}",
"event": {
"category": "intrusion_detection",
"end": "2024-11-22T08:45:51Z",
"kind": "alert",
"provider": "Identity",
"reason": "This event is generated when LDAP queries for enumerating service accounts are detected from an endpoint.",
"start": "2024-11-22T08:45:51Z",
"type": "info"
},
"@timestamp": "2024-11-22T08:45:51Z",
"observer": {
"product": "Singularity Identity",
"vendor": "SentinelOne"
},
"process": {
"command_line": "Sharphound.exe",
"executable": "c:\\users\\administrator\\desktop\\ad_recon\\sharphound.exe",
"hash": {
"sha256": "61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863"
},
"name": "sharphound.exe"
},
"related": {
"hash": [
"61F897ED69646E0509F6802FB2D7C5E88C3E3B93C4CA86942E24D203AA878863"
]
},
"sentinelone": {
"identity": {
"attackSurfaces": [
"IDENTITY"
],
"classification": "ENUMERATION",
"confidenceLevel": "MALICIOUS",
"id": "01935310-eb28-7a57-9c27-87843b2cec61",
"name": "AD Service Account Enumeration Detected",
"status": "NEW"
}
}
}
}
Loading

0 comments on commit 0f1498c

Please sign in to comment.