Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parity with Elastic Endpoint #647

Closed
33 of 40 tasks
rw-access opened this issue Nov 26, 2019 · 5 comments
Closed
33 of 40 tasks

Parity with Elastic Endpoint #647

rw-access opened this issue Nov 26, 2019 · 5 comments
Assignees
Labels
endpoint Relevant to elastic endpoint security meta

Comments

@rw-access
Copy link
Contributor

rw-access commented Nov 26, 2019

As part of the EQL integration within Elasticsearch (elastic/elasticsearch#49581), it's important that we have maximum interoperability so that queries can run on the endpoint or on Elasticsearch, and this requires the schemas to be shared between them. There is still a significant delta, so we've been using the endgame.* namespace in the interim for anything unmapped to ECS. Hopefully, this can serve as a meta issue and I'll try to track endpoint-specific mappings from here:

Related Issues

Endgame mappings

Within our EQL analytics library, we have several fields that are mapped. I bolded the ones that are used in analytics within the repo, and checked off when mapped to ECS.

Categorization

We also have a concept of enums for subtypes, which is really just a list of accepted values for a given field. This will add a layer of standardization when we standardize values for ECS, which is going to be very necessary if users expect to share across data sources.

Some of the values we've enumerated, which often map to Endgame's event_subtype_full or opcode fields. These all require solving categorization and enumerated values for event.category, event.type and event.action:

  • network subtypes
    • incoming
    • disconnect
    • outgoing
  • file subtypes
    • modify
    • create
    • delete
  • process subtypes
    • create
    • terminate
@rw-access rw-access added the meta label Nov 26, 2019
@webmat
Copy link
Contributor

webmat commented Nov 28, 2019

Thanks for opening this, Ross!

With yesterday's 1.3 release, parent process details can be captured on the event, at process.parent.*. I'm editing the issue body to that effect.

ECS issues to open

  • Can you open an issue or PR for adding registry support? There's no doubt in my mind that ECS needs to support registry events. The details of how we structure that can be hammered out over there, without crowding out this issue.
  • Could you or @andrewstucki open an issue about unique PIDs? I don't recall the exact details of how Endpoint computes it. I think this would be a useful concept to spread via ECS, if the algorithm is simple enough to explain via schema documentation.

Questions

Here's a few points or questions wrt to the rest of what I see:

  • 3 out of 4 fields are mapped for user details. Why isn't user mapped? What kind of value is typically in this field?
  • total_in_bytes and total_out_bytes should probably be mapped to source.bytes and destination.bytes.
  • What's a logon_id vs a user id?

@andrewstucki
Copy link
Contributor

@webmat , @rw-access here's the unique pid discussion issue: #672

@webmat
Copy link
Contributor

webmat commented Dec 4, 2019

And Ross opened the registry discussion at #671

@rw-access rw-access self-assigned this Dec 5, 2019
@webmat
Copy link
Contributor

webmat commented Dec 9, 2019

I'm looking at the body of the issue and I'm wondering why DNS is there. Could you open an issue stating specifically what's missing from your POV, from the current DNS field set?

@rw-access
Copy link
Contributor Author

Oh sorry, I think DNS is good. I was just being verbose and linked to existing issues.

@rw-access rw-access added the endpoint Relevant to elastic endpoint security label Jan 24, 2020
@rw-access rw-access changed the title Parity with Endgame's schema in eqllib Parity with Elastic Endpoint Jan 24, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
endpoint Relevant to elastic endpoint security meta
Projects
None yet
Development

No branches or pull requests

3 participants