Skip to content

Commit 85c1ff8

Browse files
crowdstrike: add support for cspm events in FDR data stream
1 parent ec09a28 commit 85c1ff8

29 files changed

+5837
-190
lines changed

packages/crowdstrike/_dev/benchmark/rally/fdr-benchmark/config.yml

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ fields:
2828
- ActiveDirectoryInteractiveDomain
2929
- Event_EppDetectionSummaryEvent
3030
- userinfo
31+
- cspm_ioa
32+
- cspm_iom
3133
- name: event_platform
3234
enum:
3335
- Win
@@ -180,3 +182,69 @@ fields:
180182
- Interactive
181183
- Network
182184
- Terminal Server
185+
186+
# cspm
187+
- name: policy_severity
188+
range:
189+
min: 0
190+
max: 4
191+
- name: Severity
192+
range:
193+
min: 0
194+
max: 4
195+
- name: cloud_region
196+
enum:
197+
- us-west-1
198+
- us-west-2
199+
- us-east-1
200+
- us-east-2
201+
- eu-central-1
202+
- ap-south-1
203+
- ap-northeast-1
204+
- ap-southeast-1
205+
- sa-east-1
206+
- ca-central-1
207+
- name: cloud_provider
208+
enum:
209+
- aws
210+
- azure
211+
- gcp
212+
- name: event_created
213+
period: -24h
214+
- name: vertex_type
215+
value: ioa
216+
- name: user_identity_user_name
217+
cardinality: 10000
218+
- name: disposition
219+
value: Failed
220+
- name: account
221+
range:
222+
min: 100000000000
223+
max: 999999999999
224+
cardinality: 10
225+
- name: mitre_attack_technique
226+
enum:
227+
- Account Manipulation
228+
- Cloud Infrastructure Discovery
229+
- Cloud Instance Metadata API
230+
- Cloud Service Dashboard
231+
- Cloud Storage Object Discovery
232+
- Data from Cloud Storage
233+
- Data Destruction
234+
- Phishing
235+
- Resource Hijacking
236+
- Valid Accounts
237+
- name: mitre_attack_tactic
238+
enum:
239+
- Reconnaissance
240+
- Resource Development
241+
- Initial Access
242+
- Execution
243+
- Persistence
244+
- Privilege Escalation
245+
- Defense Evasion
246+
- Credential Access
247+
- Discovery
248+
- Lateral Movement
249+
- name: ResourceId
250+
cardinality: 10000

packages/crowdstrike/_dev/benchmark/rally/fdr-benchmark/fields.yml

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -560,3 +560,89 @@
560560
type: keyword
561561
- name: DownloadServer
562562
type: keyword
563+
- name: mitre_attack_technique
564+
type: keyword
565+
- name: cloud_service_friendly
566+
type: keyword
567+
- name: policy_severity
568+
type: integer
569+
- name: event_type
570+
type: keyword
571+
- name: event_name
572+
type: keyword
573+
- name: mitre_attack_tactic
574+
type: keyword
575+
- name: event_source
576+
type: keyword
577+
- name: account
578+
type: integer
579+
- name: cloud_region
580+
type: keyword
581+
- name: event_category
582+
type: keyword
583+
- name: cloud_provider
584+
type: keyword
585+
- name: attack_types
586+
type: keyword
587+
- name: event_created
588+
type: date
589+
- name: user_identity_principal_id
590+
type: keyword
591+
- name: policy_id
592+
type: integer
593+
- name: request_id
594+
type: keyword
595+
- name: vertex_type
596+
type: keyword
597+
- name: cid
598+
type: keyword
599+
- name: vertex_id
600+
type: keyword
601+
- name: user_identity_user_name
602+
type: keyword
603+
- name: policy_description
604+
type: text
605+
- name: user_identity_arn
606+
type: keyword
607+
- name: source_ip_address
608+
type: ip
609+
- name: user_identity_account_id
610+
type: integer
611+
- name: user_identity_mfa_authenticated
612+
type: boolean
613+
- name: user_agent
614+
type: keyword
615+
- name: cloudplatform
616+
type: integer
617+
- name: service
618+
type: keyword
619+
- name: event_id
620+
type: keyword
621+
- name: read_only
622+
type: boolean
623+
- name: policy_statement
624+
type: text
625+
- name: management_event
626+
type: boolean
627+
- name: user_identity_access_key_id
628+
type: keyword
629+
- name: internal_only
630+
type: boolean
631+
- name: cloud_asset_type
632+
type: integer
633+
- name: mitre_attack_tactics_url
634+
type: keyword
635+
- name: resource_url
636+
type: keyword
637+
- name: finding
638+
type: text
639+
- name: disposition
640+
type: keyword
641+
- name: pci_benchmark_ids
642+
type: keyword
643+
- name: ResourceId
644+
type: keyword
645+
- name: ResourceIdType
646+
type: keyword
647+
- name: ResourceCreateTime
648+
type: date

packages/crowdstrike/_dev/benchmark/rally/fdr-benchmark/template.ndjson

Lines changed: 113 additions & 1 deletion
Large diffs are not rendered by default.

packages/crowdstrike/_dev/build/docs/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ The [CrowdStrike](https://www.crowdstrike.com/) integration allows you to easily
2424

2525
- `vulnerability` dataset: It retrieves all the vulnerabilities in your environment, providing information such as severity, status, confidence levels, remediation guidance, and affected hosts, as detected by the CrowdStrike Falcon platform, via the Falcon Spotlight Vulnerability API - `/spotlight/combined/vulnerabilities/v1`.
2626

27-
3. **Falcon Data Replicator**: This Collect events in near real time from your endpoints and cloud workloads, identities and data. CrowdStrike Falcon Data Replicator (FDR) enables you with actionable insights to improve SOC performance. FDR contains near real-time data collected by the Falcon platform's single, lightweight agent. It includes the following datasets for receiving logs:
27+
3. **Falcon Data Replicator**: This collects events in near real-time from your endpoints, cloud workloads, identities, and data. CrowdStrike Falcon Data Replicator (FDR) enables you with actionable insights to improve SOC performance. FDR contains near real-time data collected by the Falcon platform's single, lightweight agent. It includes the following datasets for receiving logs:
2828

29-
- `fdr` dataset: consists of logs forwarded using the [Falcon Data Replicator](https://github.com/CrowdStrike/FDR).
29+
- `fdr` dataset: consists of logs forwarded using the [Falcon Data Replicator](https://github.com/CrowdStrike/FDR). In addition to the existing log types, the integration now includes support for parsing Cloud Security Posture Management (CSPM) Indicators of Misconfiguration (IOM) and Indicators of Attack (IOA) events.
3030

3131
4. **CrowdStrike Event Stream**: This streams security logs from CrowdStrike Event Stream, including authentication activity, cloud security posture management (CSPM), firewall logs, user activity, and XDR data. It captures real-time security events like user logins, cloud environment changes, network traffic, and advanced threat detections. The streaming integration provides continuous monitoring and analysis for proactive threat detection. It enhances visibility into user behavior, network security, and overall system health. This setup enables faster response capabilities to emerging security incidents. It includes the following datasets for receiving logs:
3232

packages/crowdstrike/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "2.7.0"
3+
changes:
4+
- description: Add support for CSPM IOA and IOM events in the FDR data stream.
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/15783
27
- version: "2.6.0"
38
changes:
49
- description: Add a fallback parsing command_line to populate the process name in the FDR data stream.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"mitre_attack_technique":"Data Destruction","response_elements":"{\"requestId\":\"8db1ca21-4d8b-4c08-b7bc-a63186cd7740\",\"instancesSet\":{\"items\":[{\"currentState\":{\"code\":32,\"name\":\"shutting-down\"},\"previousState\":{\"code\":16,\"name\":\"running\"},\"instanceId\":\"i-0e244c4469aea5be0\"}]}}","cloud_service_friendly":"EC2","aws_account_id":"144492464627","policy_severity":1,"event_type":"AwsApiCall","event_name":"TerminateInstances","mitre_attack_tactic":"Impact","event_source":"ec2.amazonaws.com","account":"144492464627","cloud_region":"us-east-2","event_category":"Management","cloud_provider":"aws","attack_types":["Destruction"],"event_created":"2025-10-02T19:51:16Z","user_identity_principal_id":"AIDASDJDMBHZXZ7A56T2M","event-type":"cspm_policy_249","policy_id":249,"request_id":"8db1ca21-4d8b-4c08-b7bc-a63186cd7740","vertex_type":"ioa","cid":"bdc3e3474d8848f1b8dcf41d41669a14","request_parameters":"{\"instancesSet\":{\"items\":[{\"instanceId\":\"i-0e244c4469aea5be0\"}]},\"force\":false,\"skipOsShutdown\":false}","vertex_id":"249:c7c1f904-44bb-4690-9816-c510246c3b6a:ioa","user_identity_user_name":"buildkite","policy_description":"An IAM user was detected to have manually deleted an EC2 instance. This may indicate malicious activity in that it was not auto-scaling or some other automation that deleted the instance.","user_identity_arn":"arn:aws:iam::144492464627:user/services/buildkite","source_ip_address":"89.160.20.112","user_identity_account_id":"144492464627","user_identity_mfa_authenticated":"false","user_agent":"APN/1.0 HashiCorp/1.0 Terraform/1.12.1 (+https://www.terraform.io) terraform-provider-aws/4.61.0 (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.44.232 (go1.19.7; linux; amd64)","cloudplatform":1,"service":"EC2","event_id":"c7c1f904-44bb-4690-9816-c510246c3b6a","read_only":false,"policy_statement":"EC2 instance manually deleted by IAM user","management_event":true,"user_identity_access_key_id":"AKIASDJDMBHZ3YGQZQ4Q"}
Lines changed: 154 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,154 @@
1+
{
2+
"expected": [
3+
{
4+
"@timestamp": "2025-10-02T19:51:16.000Z",
5+
"cloud": {
6+
"account": {
7+
"id": "144492464627"
8+
},
9+
"provider": "aws",
10+
"region": "us-east-2",
11+
"service": {
12+
"name": "EC2"
13+
}
14+
},
15+
"crowdstrike": {
16+
"EventType": "AwsApiCall",
17+
"SeverityName": "high",
18+
"attack_types": [
19+
"Destruction"
20+
],
21+
"aws_account_id": "144492464627",
22+
"cid": "bdc3e3474d8848f1b8dcf41d41669a14",
23+
"cloudplatform": "1",
24+
"event-type": "cspm_policy_249",
25+
"event_category": "Management",
26+
"management_event": true,
27+
"policy_severity": 1,
28+
"read_only": false,
29+
"request": {
30+
"id": "8db1ca21-4d8b-4c08-b7bc-a63186cd7740",
31+
"parameters": {
32+
"force": false,
33+
"instancesSet": {
34+
"items": [
35+
{
36+
"instanceId": "i-0e244c4469aea5be0"
37+
}
38+
]
39+
},
40+
"skipOsShutdown": false
41+
}
42+
},
43+
"response_elements": {
44+
"instancesSet": {
45+
"items": [
46+
{
47+
"currentState": {
48+
"code": 32,
49+
"name": "shutting-down"
50+
},
51+
"instanceId": "i-0e244c4469aea5be0",
52+
"previousState": {
53+
"code": 16,
54+
"name": "running"
55+
}
56+
}
57+
]
58+
},
59+
"requestId": "8db1ca21-4d8b-4c08-b7bc-a63186cd7740"
60+
},
61+
"service": "EC2",
62+
"user_identity_access_key_id": "AKIASDJDMBHZ3YGQZQ4Q",
63+
"user_identity_account_id": "144492464627",
64+
"user_identity_arn": "arn:aws:iam::144492464627:user/services/buildkite",
65+
"user_identity_mfa_authenticated": false,
66+
"vertex_id": "249:c7c1f904-44bb-4690-9816-c510246c3b6a:ioa",
67+
"vertex_type": "ioa"
68+
},
69+
"event": {
70+
"action": "TerminateInstances",
71+
"category": [
72+
"configuration"
73+
],
74+
"created": "2025-10-02T19:51:16.000Z",
75+
"id": "c7c1f904-44bb-4690-9816-c510246c3b6a",
76+
"kind": "alert",
77+
"original": "{\"mitre_attack_technique\":\"Data Destruction\",\"response_elements\":\"{\\\"requestId\\\":\\\"8db1ca21-4d8b-4c08-b7bc-a63186cd7740\\\",\\\"instancesSet\\\":{\\\"items\\\":[{\\\"currentState\\\":{\\\"code\\\":32,\\\"name\\\":\\\"shutting-down\\\"},\\\"previousState\\\":{\\\"code\\\":16,\\\"name\\\":\\\"running\\\"},\\\"instanceId\\\":\\\"i-0e244c4469aea5be0\\\"}]}}\",\"cloud_service_friendly\":\"EC2\",\"aws_account_id\":\"144492464627\",\"policy_severity\":1,\"event_type\":\"AwsApiCall\",\"event_name\":\"TerminateInstances\",\"mitre_attack_tactic\":\"Impact\",\"event_source\":\"ec2.amazonaws.com\",\"account\":\"144492464627\",\"cloud_region\":\"us-east-2\",\"event_category\":\"Management\",\"cloud_provider\":\"aws\",\"attack_types\":[\"Destruction\"],\"event_created\":\"2025-10-02T19:51:16Z\",\"user_identity_principal_id\":\"AIDASDJDMBHZXZ7A56T2M\",\"event-type\":\"cspm_policy_249\",\"policy_id\":249,\"request_id\":\"8db1ca21-4d8b-4c08-b7bc-a63186cd7740\",\"vertex_type\":\"ioa\",\"cid\":\"bdc3e3474d8848f1b8dcf41d41669a14\",\"request_parameters\":\"{\\\"instancesSet\\\":{\\\"items\\\":[{\\\"instanceId\\\":\\\"i-0e244c4469aea5be0\\\"}]},\\\"force\\\":false,\\\"skipOsShutdown\\\":false}\",\"vertex_id\":\"249:c7c1f904-44bb-4690-9816-c510246c3b6a:ioa\",\"user_identity_user_name\":\"buildkite\",\"policy_description\":\"An IAM user was detected to have manually deleted an EC2 instance. This may indicate malicious activity in that it was not auto-scaling or some other automation that deleted the instance.\",\"user_identity_arn\":\"arn:aws:iam::144492464627:user/services/buildkite\",\"source_ip_address\":\"89.160.20.112\",\"user_identity_account_id\":\"144492464627\",\"user_identity_mfa_authenticated\":\"false\",\"user_agent\":\"APN/1.0 HashiCorp/1.0 Terraform/1.12.1 (+https://www.terraform.io) terraform-provider-aws/4.61.0 (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.44.232 (go1.19.7; linux; amd64)\",\"cloudplatform\":1,\"service\":\"EC2\",\"event_id\":\"c7c1f904-44bb-4690-9816-c510246c3b6a\",\"read_only\":false,\"policy_statement\":\"EC2 instance manually deleted by IAM user\",\"management_event\":true,\"user_identity_access_key_id\":\"AKIASDJDMBHZ3YGQZQ4Q\"}",
78+
"severity": 73,
79+
"type": [
80+
"info",
81+
"change"
82+
]
83+
},
84+
"message": "EC2 instance manually deleted by IAM user",
85+
"related": {
86+
"ip": [
87+
"89.160.20.112"
88+
],
89+
"user": [
90+
"buildkite",
91+
"AIDASDJDMBHZXZ7A56T2M"
92+
]
93+
},
94+
"rule": {
95+
"description": "An IAM user was detected to have manually deleted an EC2 instance. This may indicate malicious activity in that it was not auto-scaling or some other automation that deleted the instance.",
96+
"id": "249",
97+
"name": "EC2 instance manually deleted by IAM user"
98+
},
99+
"source": {
100+
"address": "89.160.20.112",
101+
"as": {
102+
"number": 29518,
103+
"organization": {
104+
"name": "Bredband2 AB"
105+
}
106+
},
107+
"domain": "ec2.amazonaws.com",
108+
"geo": {
109+
"city_name": "Linköping",
110+
"continent_name": "Europe",
111+
"country_iso_code": "SE",
112+
"country_name": "Sweden",
113+
"location": {
114+
"lat": 58.4167,
115+
"lon": 15.6167
116+
},
117+
"region_iso_code": "SE-E",
118+
"region_name": "Östergötland County"
119+
},
120+
"ip": "89.160.20.112"
121+
},
122+
"tags": [
123+
"preserve_original_event"
124+
],
125+
"threat": {
126+
"tactic": {
127+
"name": [
128+
"Impact"
129+
]
130+
},
131+
"technique": {
132+
"name": [
133+
"Data Destruction"
134+
]
135+
}
136+
},
137+
"user": {
138+
"id": "AIDASDJDMBHZXZ7A56T2M",
139+
"name": "buildkite"
140+
},
141+
"user_agent": {
142+
"device": {
143+
"name": "Other"
144+
},
145+
"name": "aws-sdk-go",
146+
"original": "APN/1.0 HashiCorp/1.0 Terraform/1.12.1 (+https://www.terraform.io) terraform-provider-aws/4.61.0 (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.44.232 (go1.19.7; linux; amd64)",
147+
"os": {
148+
"name": "Linux"
149+
},
150+
"version": "1.44.232"
151+
}
152+
}
153+
]
154+
}
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"event_simpleName":"CloudSecurityIOMEvaluation","cid":"bdc3e3474d8848f1b8dcf41d41669a14","crn":"aws|144492464627|global|AWS::Account|144492464627","created":"2025-10-13T03:59:08.974734575Z","firstDetected":"2025-10-08T13:03:26.203492662Z","lastDetected":"2025-10-13T03:59:08.974734575Z","revision":7,"ruleId":"abc16f84-2de2-4f2e-9f9c-d510f47b75fb","ruleName":"[Custom Test] EBS volume encryption is not enabled by default in all regions","legacyPolicyId":100056,"severity":"informational","status":"Unresolved","findings":[{"name":"Encryption Enabled","value":"False"},{"name":"Region","value":"[\"ca-central-1\",\"sa-east-1\",\"eu-central-1\",\"eu-west-1\",\"us-east-1\",\"us-east-2\",\"us-west-2\",\"ap-northeast-2\",\"ap-southeast-1\",\"ap-south-1\",\"us-west-1\",\"eu-west-3\",\"ap-northeast-3\",\"ap-southeast-2\",\"ap-northeast-1\",\"eu-west-2\",\"eu-north-1\"]"}],"url":"https://us-east-1.console.aws.amazon.com/ec2/home?region=us-east-1#Volumes:","resource":{"accountId":"144492464627","cloudProvider":"aws","region":"global","captured":"2025-10-13T03:59:08.167485551Z","resourceId":"144492464627","resourceType":"AWS::Account","legacyResourceId":"144492464627","legacyResourceTypeId":116},"compliance":{"frameworks":["Amazon","CIS"],"versions":["11.2024","v1.0.0"],"benchmarkNames":["AWS Well-Architected Framework (Section 2 - Security) 11.2024","AWS Foundational Security Best Practices v1.0.0"],"sections":["SEC 8. How do you protect your data at rest?","EC2"],"requirements":["SEC08-BP03","EC2.7"]},"threat":{"framework":"MITRE ATT\u0026CK","technique":{"id":"T1530","name":"Data from Cloud Storage","reference":"https://attack.mitre.org/techniques/T1530/"},"tactic":{"id":"TA0009","name":"Collection","reference":"https://attack.mitre.org/tactics/TA0009/"}}}

0 commit comments

Comments
 (0)