You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
StreamAlert Normalization is a feature that makes it easier to write rules that are agnostic of the vendor(s)/format(s) that generate log data. It allows @rules to be written on datatypes and normalized vocabulary, instead of having to write one rule for each of the vendor log formats. It also alleviates the need to be intimately familiar with log formats.
However, these data are not easily searchable in Athena. In fact, it is virtually impossible to do a search of a particular IoC across all data schemas in the entire system.
Being able to do such a search would be greatly beneficial for Investigations. Additionally, StreamQuery (#1116) could greatly benefit from this as well.
Description
Consider the opening of this issue to be a public teaser for Normalization v2.0!
As an additional second step to StreamAlert normalization, we will extract all normalized data and drop them into Athena in a searchable format.
function — Short, optional string that summarizes how the field is being used in the original record
source_type — The name of the table the original record is on
record_id — A globally unique id that is assigned to the original record. All Artifacts generated from that record share the same record_id.
User Journey
The above table actually illustrates an interesting situation that is not currently easy for StreamAlert to detect.
Suppose a threat, www.badwebsite.com, which constantly changes its IP address in order to evade detection. In the above example, we used osquery to monitor net traffic, and is able to detect that a specific machine made a connection to an ip address, 50.50.50.50... which we may not yet have identified as a threat or not.
However, a neighboring record from infoblox found that a recent DNS lookup that discovered 50.50.50.50 was associated with the known bad domain: www.badwebsite.com. OooOOoOoOOOoOOOOooOOO!
We infer that the computer, ryxias.macbook.pro, made an outbound connection request to what may have been a known bad domain. Which means it might be pwned.
The text was updated successfully, but these errors were encountered:
Background
StreamAlert Normalization is a feature that makes it easier to write rules that are agnostic of the vendor(s)/format(s) that generate log data. It allows
@rule
s to be written ondatatypes
and normalized vocabulary, instead of having to write one rule for each of the vendor log formats. It also alleviates the need to be intimately familiar with log formats.However, these data are not easily searchable in Athena. In fact, it is virtually impossible to do a search of a particular IoC across all data schemas in the entire system.
Being able to do such a search would be greatly beneficial for Investigations. Additionally, StreamQuery (#1116) could greatly benefit from this as well.
Description
Consider the opening of this issue to be a public teaser for Normalization v2.0!
As an additional second step to StreamAlert normalization, we will extract all normalized data and drop them into Athena in a searchable format.
To do so, we'll leverage Kinesis Firehose Data Transformation.
Data Schema
26ee9dec-ba5a-48b4-99f5-5118ab74507e
8d385e22-6ceb-4ef0-ac2f-5bfaf15d1a13
187ed024-f986-4484-86d7-0faaf703fcc1
187ed024-f986-4484-86d7-0faaf703fcc1
187ed024-f986-4484-86d7-0faaf703fcc1
User Journey
The above table actually illustrates an interesting situation that is not currently easy for StreamAlert to detect.
Suppose a threat,
www.badwebsite.com
, which constantly changes its IP address in order to evade detection. In the above example, we usedosquery
to monitor net traffic, and is able to detect that a specific machine made a connection to an ip address,50.50.50.50
... which we may not yet have identified as a threat or not.However, a neighboring record from
infoblox
found that a recent DNS lookup that discovered50.50.50.50
was associated with the known bad domain:www.badwebsite.com
. OooOOoOoOOOoOOOOooOOO!We infer that the computer,
ryxias.macbook.pro
, made an outbound connection request to what may have been a known bad domain. Which means it might be pwned.The text was updated successfully, but these errors were encountered: