Closed freeload101 closed 5 months ago
A few points
/alerts/queries/alerts/v2
endpoint to run queries for alerts stored in Falcon SIEM (the destination for CS agents data)/alerts/queries/alerts/v2
is an ad hoc query that runs against the FalconPy SIEM (like the splunkd
API you are using in the CS_BADGER script, which as you mentioned is probably modded Splunk anywayPrior art
/alerts/queries/alerts/v2
endpoint to query alerts (see Cribl collector template). They have SLAs to support petabytes of data queries / hunts for Fortune 100 companies. This is definitely good enough for Tracecat (which is a SOAR not a security data lake / data pipeline / SIEM)Other comments
We are using FalconPy under-the-hood
Side note
CS_BADGER
(aka use splunk API endpoint) solution is sufficient either.Reference:
Crowdstrike integration.
Authentication method: Direct Authentication
Requires a crowdstrike
secret with:
CROWDSTRIKE_CLIENT_ID
CROWDSTRIKE_CLIENT_SECRET
References:
Supported APIs:
list_alerts = {
"endpoint": "/alerts/queries/alerts/v2",
"method": "GET",
"ocsf_schema": "array[detection_finding]",
"reference": "https://falconpy.io/Service-Collections/Alerts.html#getqueriesalertsv2"
}
list_detections = {
"endpoint": "/detects/queries/detects/v1",
"method": "GET",
"ocsf_schema": "array[detection_finding]",
"reference": "https://falconpy.io/Service-Collections/Detects.html#querydetects"
}
Reference https://github.com/TracecatHQ/tracecat/issues/7
The CS API is basically useless ... Thry have a Splunk app that lets you pull saved searches ( I haven't reversed engineered it but it's probably lame API The problem with scheduled searches is that you have to wait Way too long to actually run a schedule when you create it... She can't really use it for IR..
We're on CS "Next Gen SIEM" ... aka LogScale .... Aka ..Humio....aka modded Splunk (from what I hear) ...
Anyway be nice to have CA_BADGER back for adv hunting but our SOC is not Interested..