Skip to content

Commit 75b784f

Browse files
magermarkpzl
authored andcommitted
[9.0.1] AMSI API changes for behavior rule alerts - process.Ext.api.parameters.content_name (#609)
* Entries for process.Ext.api.parameters and process.Ext.api.parameters.content_name * Added process.Ext.api.parameters.app_name * custom_subsets changes for process.Ext.api.parameters.content_name and process.Ext.api.parameters.app_name * Add fields under parameters * testing * Test Windows * Revert Windows change * Revert .bat * Remove test * Remove test_name * Generated changes
1 parent ee9fdce commit 75b784f

File tree

4 files changed

+60
-0
lines changed

4 files changed

+60
-0
lines changed

custom_subsets/elastic_endpoint/alerts/rule_detection_event.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,10 @@ fields:
3030
name: {}
3131
summary: {}
3232
behaviors: {}
33+
parameters:
34+
fields:
35+
app_name: {}
36+
content_name: {}
3337
created_suspended: {}
3438
token:
3539
fields:

package/endpoint/data_stream/alerts/fields/fields.yml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4553,6 +4553,25 @@
45534553
description: The name of the API, usually the name of the function or system call.
45544554
example: VirtualAlloc
45554555
default_field: false
4556+
- name: Ext.api.parameters
4557+
level: custom
4558+
type: object
4559+
description: Parameter values passed to the API call.
4560+
default_field: false
4561+
- name: Ext.api.parameters.app_name
4562+
level: custom
4563+
type: keyword
4564+
ignore_above: 1024
4565+
description: The application name requesting the AMSI scan.
4566+
example: PowerShell
4567+
default_field: false
4568+
- name: Ext.api.parameters.content_name
4569+
level: custom
4570+
type: keyword
4571+
ignore_above: 1024
4572+
description: The content name, typically a filename, associated with an AMSI scan.
4573+
example: C:\script.ps1
4574+
default_field: false
45564575
- name: Ext.api.summary
45574576
level: custom
45584577
type: keyword

package/endpoint/docs/README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -653,6 +653,9 @@ sent by the endpoint.
653653
| process.Ext.ancestry | An array of entity_ids indicating the ancestors for this event | keyword |
654654
| process.Ext.api.behaviors | A list of observed behaviors. "cross-process" - the observed activity was between two processes "parent-child" - the observed activity was between a parent process and its child "native_api" - a call was made directly to the Native API rather than the Win32 API "direct_syscall" - a syscall instruction originated outside of the Native API layer "proxy_call" - the call stack may indicate of a proxied API call to mask the true source "sensitive_api" - executable non-image memory is unexpectedly calling a sensitive API "shellcode" - suspicious executable non-image memory is calling a sensitive API "image_hooked" - an entry in the callstack appears to have been hooked "image_indirect_call" - an entry in the callstack was preceded by a call to a dynamically resolved function "image_rop" - no call instruction preceded an entry in the call stack "image_rwx" - an entry in the callstack is writable "unbacked_rwx" - an entry in the callstack is non-image and writable "truncated_stack" - call stack is unexpected truncated due to malicious tampering or system load "allocate_shellcode" - a region of non-image executable memory allocated more executable memory "execute_fluctuation" - the PAGE_EXECUTE protection is unexpectedly fluctuating "write_fluctuation" - the PAGE_WRITE protection of executable memory is unexpectedly fluctuating "hook_api" - a change to the memory protection of a small executable image memory region was made "hollow_image" - a change to the memory protection of a large executable image memory region was made "hook_unbacked" - a change to the memory protection of a small executable non-image memory was made "hollow_unbacked" - a change to the memory protection of a large executable non-image memory was made "guarded_code" - executable memory was unexpectedly marked as PAGE_GUARD "hidden_code" - executable memory was unexpectedly marked as PAGE_NOACCESS "execute_shellcode" - a region of non-image executable memory was unexpectedly transferred control "hardware_breakpoint_set" - a hardware breakpoint was set "rapid_background_polling" - a suspicious process which does rapid input polling via GetAsyncKeyState API was observed "multiple_polling_processes" - multiple suspicious processes which do rapid input polling via the GetAsyncKeyState API were observed "pid_spoofing" - The acting process details may have been spoofed to hide the true origin "legacy_api" - a deprecated or superseded API was called | keyword |
655655
| process.Ext.api.name | The name of the API, usually the name of the function or system call. | keyword |
656+
| process.Ext.api.parameters | Parameter values passed to the API call. | object |
657+
| process.Ext.api.parameters.app_name | The application name requesting the AMSI scan. | keyword |
658+
| process.Ext.api.parameters.content_name | The content name, typically a filename, associated with an AMSI scan. | keyword |
656659
| process.Ext.api.summary | The summary of the API call and its parameters. | keyword |
657660
| process.Ext.architecture | Process architecture. It can differ from host architecture. | keyword |
658661
| process.Ext.authentication_id | Process authentication ID | keyword |

schemas/v1/alerts/rule_detection_event.yaml

Lines changed: 34 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)