TracecatHQ / tracecat

The open source Tines / Splunk SOAR alternative for security engineers.
https://tracecat.com
GNU Affero General Public License v3.0
2.44k stars 176 forks source link

CrowdStrike SIEM implementation not just JSON API #233

Closed freeload101 closed 5 months ago

freeload101 commented 5 months ago

Reference https://github.com/TracecatHQ/tracecat/issues/7

The CS API is basically useless ... Thry have a Splunk app that lets you pull saved searches ( I haven't reversed engineered it but it's probably lame API The problem with scheduled searches is that you have to wait Way too long to actually run a schedule when you create it... She can't really use it for IR..

We're on CS "Next Gen SIEM" ... aka LogScale .... Aka ..Humio....aka modded Splunk (from what I hear) ...

Anyway be nice to have CA_BADGER back for adv hunting but our SOC is not Interested..

topher-lo commented 5 months ago

A few points

  1. We aren't using Crowdstrike scheduled searches. The scheduling is managed by Tracecat via Temporal.
  2. We are using the /alerts/queries/alerts/v2 endpoint to run queries for alerts stored in Falcon SIEM (the destination for CS agents data)
  3. The endpoint /alerts/queries/alerts/v2 is an ad hoc query that runs against the FalconPy SIEM (like the splunkd API you are using in the CS_BADGER script, which as you mentioned is probably modded Splunk anyway

Prior art

Other comments

We are using FalconPy under-the-hood

Side note

Reference:

Authentication method: Direct Authentication

Requires a crowdstrike secret with:

References:

Supported APIs:

list_alerts = {
    "endpoint": "/alerts/queries/alerts/v2",
    "method": "GET",
    "ocsf_schema": "array[detection_finding]",
    "reference": "https://falconpy.io/Service-Collections/Alerts.html#getqueriesalertsv2"
}

list_detections = {
    "endpoint": "/detects/queries/detects/v1",
    "method": "GET",
    "ocsf_schema": "array[detection_finding]",
    "reference": "https://falconpy.io/Service-Collections/Detects.html#querydetects"
}