Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update cardinality field in schema for threshold rules #1349

Merged
merged 13 commits into from
Jul 21, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions detection_rules/rule.py
Original file line number Diff line number Diff line change
Expand Up @@ -183,7 +183,7 @@ class BaseRuleData(MarshmallowDataclassMixin):
def save_schema(cls):
"""Save the schema as a jsonschema."""
fields: List[dataclasses.Field] = dataclasses.fields(cls)
type_field = next(field for field in fields if field.name == "type")
type_field = next(f for f in fields if f.name == "type")
rule_type = typing.get_args(type_field.type)[0] if cls != BaseRuleData else "base"
schema = cls.jsonschema()
version_dir = SCHEMA_DIR / "master"
Expand Down Expand Up @@ -256,9 +256,9 @@ class ThresholdCardinality:
field: str
value: definitions.ThresholdValue

field: List[definitions.NonEmptyStr]
field: definitions.CardinalityFields
value: definitions.ThresholdValue
cardinality: Optional[ThresholdCardinality]
cardinality: Optional[List[ThresholdCardinality]]

type: Literal["threshold"]
threshold: ThresholdMapping
Expand Down
2 changes: 1 addition & 1 deletion detection_rules/rule_formatter.py
Original file line number Diff line number Diff line change
Expand Up @@ -206,5 +206,5 @@ def _do_write(_data, _contents):
_do_write(data, _contents)

finally:
if needs_close:
if needs_close and hasattr(outfile, "close"):
outfile.close()
2 changes: 1 addition & 1 deletion detection_rules/schemas/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ def downgrade_threshold_to_7_11(version: Version, api_contents: dict) -> dict:
if len(threshold_field) > 1:
raise ValueError('Cannot downgrade a threshold rule that has multiple threshold fields defined')

if threshold.get('cardinality', {}).get('field') or threshold.get('cardinality', {}).get('value'):
if threshold.get('cardinality'):
raise ValueError('Cannot downgrade a threshold rule that has a defined cardinality')

api_contents = api_contents.copy()
Expand Down
8 changes: 5 additions & 3 deletions detection_rules/schemas/definitions.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

"""Custom shared definitions for schemas."""

from typing import Literal, Final
from typing import List, Literal, Final

from marshmallow import validate
from marshmallow_dataclass import NewType
Expand Down Expand Up @@ -44,19 +44,21 @@
}


NonEmptyStr = NewType('NonEmptyStr', str, validate=validate.Length(min=1))

BranchVer = NewType('BranchVer', str, validate=validate.Regexp(BRANCH_PATTERN))
CardinalityFields = NewType('CardinalityFields', List[NonEmptyStr], validate=validate.Length(min=0, max=3))
CodeString = NewType("CodeString", str)
ConditionSemVer = NewType('ConditionSemVer', str, validate=validate.Regexp(CONDITION_VERSION_PATTERN))
Date = NewType('Date', str, validate=validate.Regexp(DATE_PATTERN))
FilterLanguages = Literal["kuery", "lucene"]
Interval = NewType('Interval', str, validate=validate.Regexp(INTERVAL_PATTERN))
PositiveInteger = NewType('PositiveInteger', int, validate=validate.Range(min=1))
Markdown = NewType("MarkdownField", CodeString)
Maturity = Literal['development', 'experimental', 'beta', 'production', 'deprecated']
MaxSignals = NewType("MaxSignals", int, validate=validate.Range(min=1))
NonEmptyStr = NewType('NonEmptyStr', str, validate=validate.Length(min=1))
Operator = Literal['equals']
OSType = Literal['windows', 'linux', 'macos']
PositiveInteger = NewType('PositiveInteger', int, validate=validate.Range(min=1))
RiskScore = NewType("MaxSignals", int, validate=validate.Range(min=1, max=100))
RuleType = Literal['query', 'saved_query', 'machine_learning', 'eql', 'threshold', 'threat_match']
SemVer = NewType('SemVer', str, validate=validate.Regexp(VERSION_PATTERN))
Expand Down
41 changes: 26 additions & 15 deletions etc/api_schemas/7.12/7.12.threshold.json
Original file line number Diff line number Diff line change
Expand Up @@ -919,35 +919,46 @@
"additionalProperties": false,
"properties": {
"cardinality": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
"items": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
},
"value": {
"minimum": 1,
"type": "integer"
}
"required": [
"field",
"value"
],
"type": "object"
},
"required": [
"field",
"value"
],
"type": "object"
"type": "array"
},
"field": {
"description": "CardinalityFields",
"items": {
"default": "",
"description": "NonEmptyStr",
"minLength": 1,
"type": "string"
},
"maxItems": 3,
"type": "array"
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "integer"
"type": "number"
}
},
"required": [
"field",
"value"
],
"type": "object"
Expand Down
47 changes: 32 additions & 15 deletions etc/api_schemas/7.13/7.13.threshold.json
Original file line number Diff line number Diff line change
Expand Up @@ -112,6 +112,9 @@
"type": "string"
},
"operator": {
"enum": [
"equals"
],
"type": "string"
},
"value": {
Expand Down Expand Up @@ -151,6 +154,9 @@
"type": "string"
},
"operator": {
"enum": [
"equals"
],
"type": "string"
},
"severity": {
Expand Down Expand Up @@ -178,6 +184,9 @@
"additionalProperties": false,
"properties": {
"framework": {
"enum": [
"MITRE ATT&CK"
],
"type": "string"
},
"tactic": {
Expand Down Expand Up @@ -265,30 +274,35 @@
"additionalProperties": false,
"properties": {
"cardinality": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
"items": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
"required": [
"field",
"value"
],
"type": "object"
},
"required": [
"field",
"value"
],
"type": "object"
"type": "array"
},
"field": {
"description": "CardinalityFields",
"items": {
"description": "NonEmptyStr",
"minLength": 1,
"type": "string"
},
"maxItems": 3,
"type": "array"
},
"value": {
Expand Down Expand Up @@ -336,6 +350,9 @@
"type": "string"
},
"type": {
"enum": [
"threshold"
],
"type": "string"
}
},
Expand Down
35 changes: 20 additions & 15 deletions etc/api_schemas/7.14/7.14.threshold.json
Original file line number Diff line number Diff line change
Expand Up @@ -274,30 +274,35 @@
"additionalProperties": false,
"properties": {
"cardinality": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
"items": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
"required": [
"field",
"value"
],
"type": "object"
},
"required": [
"field",
"value"
],
"type": "object"
"type": "array"
},
"field": {
"description": "CardinalityFields",
"items": {
"description": "NonEmptyStr",
"minLength": 1,
"type": "string"
},
"maxItems": 3,
"type": "array"
},
"value": {
Expand Down
35 changes: 20 additions & 15 deletions etc/api_schemas/master/master.threshold.json
Original file line number Diff line number Diff line change
Expand Up @@ -274,30 +274,35 @@
"additionalProperties": false,
"properties": {
"cardinality": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
"items": {
"additionalProperties": false,
"properties": {
"field": {
"type": "string"
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
},
"value": {
"description": "ThresholdValue",
"format": "integer",
"minimum": 1,
"type": "number"
}
"required": [
"field",
"value"
],
"type": "object"
},
"required": [
"field",
"value"
],
"type": "object"
"type": "array"
},
"field": {
"description": "CardinalityFields",
"items": {
"description": "NonEmptyStr",
"minLength": 1,
"type": "string"
},
"maxItems": 3,
"type": "array"
},
"value": {
Expand Down
2 changes: 1 addition & 1 deletion etc/stack-schema-map.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@

"7.14.0":
beats: "master" # TODO: 7.14.x
ecs: "1.10.0"
ecs: "master" # TODO: master came out after 7.13.0 release
2 changes: 1 addition & 1 deletion requirements.txt
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ PyYAML~=5.3
eql==0.9.9
elasticsearch~=7.9
XlsxWriter~=1.3.6
marshmallow~=3.10.0
marshmallow~=3.12.2
marshmallow-dataclass[union]~=8.4

# test deps
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
[metadata]
creation_date = "2021/07/14"
maturity = "production"
updated_date = "2021/07/14"
min_stack_version = "7.14.0"

[rule]
author = ["Elastic"]
description = """Detects events which have a mismatch on the expected event agent ID. The status "agent_id_mismatch"
occurs when the expected agent ID associated with the API key does not match the actual agent ID in an event. This could
indicate attempts to spoof events in order to masquerade actual activity to evade detection.
"""
false_positives = [
"""
This is meant to run only on datasources using agents v7.14+ since versions prior to that will be missing the
necessary field, resulting in false positives.
""",
]
from = "now-9m"
index = ["logs-*", "metrics-*", "traces-*"]
language = "kuery"
license = "Elastic License v2"
name = "Agent Spoofing - Mismatched Agent ID"
risk_score = 73
rule_id = "3115bd2c-0baa-4df0-80ea-45e474b5ef93"
severity = "high"
tags = ["Elastic", "Threat Detection", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

query = '''
event.agent_id_status:agent_id_mismatch
'''


[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1036"
name = "Masquerading"
reference = "https://attack.mitre.org/techniques/T1036/"


[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"

Loading