11# Index to search, wildcard supported
2- name : New attacker
2+ name : Known Attacks
33
4- # Type of alert.
4+ # Alert on each event
55type : any
66
7- query_key :
8- - " context.ip"
9- - " context.http.userAgent"
10-
11- realert :
12- hours : 1
13-
14- # (Optional, new_term specific)
15- # This means that we will query 10 days worth of data when ElastAlert starts to find which values of ip_address already exist
16- # If they existed in the last 10 days, no alerts will be triggered for them when they appear
17- terms_window_size :
18- days : 10
19-
20- alert_on_missing_field : true
21-
22- # Index to search, wildcard supported
23- index : bitsensor
24- timestamp_field : endpoint.localtime
25-
7+ # A list of elasticsearch filters used for find events
8+ # These filters are joined with AND and nested in a filtered query
9+ # For more info: http://www.elasticsearch.org/guide/en/elasticsearch/reference/current/query-dsl.html
2610filter :
2711- query :
2812 query_string :
29- query : " _exists_:detections AND detections.relevant:true"
13+ query : " detections.reason:KNOWN_ATTACK"
14+
15+ index : bitsensor-detections-*
16+ timestamp_field : endpoint.localtime
3017
18+ # When the attacker continues, send a new alert after x minutes
19+ realert :
20+ minutes : 10
21+
22+ # Index to search, wildcard supported
3123include :
3224 - endpoint.location
3325 - endpoint.name
3426 - context.http.userAgent
3527 - context.ip
3628 - context.php.session.sessionId
37- - detections.type
38- - detections.name
29+ - detections
3930
40- alert_subject : " Relevant attack on {} "
31+ alert_subject : " Attack on <{}> of type {} | <{}|Show Dashboard> "
4132alert_subject_args :
4233 - endpoint.name
34+ - detections_parsed.type
35+ - kibana_link
36+
37+ alert_text : |-
38+ An attack on {} is detected.
39+ Detection name: {}
40+ Detection type: {}
41+
42+ The attacker looks like:
43+ IP: {}
44+ User-Agent: {}
4345
44- alert_text_type : alert_text_only
45- alert_text : " New relevant attacker at {}\n IP: {} \n User-Agent: {}\n Detection name: {}\n Detection type: {}\n\n ID: {}\n User: {}"
4646alert_text_args :
47- - endpoint.localtime
47+ - endpoint.name
48+ - detections_parsed.name
49+ - detections_parsed.type
4850 - context.ip
4951 - context.http.userAgent
50- - detections.name
51- - detections.type
52- - _id
53- - meta.user
54-
5552
56- # The alert is use when a match is found
53+ # Specify your services here
5754alert :
5855 - slack
56+
57+ # How To Generate your API:
58+ # Click on your Workspace name (upper left corner)
59+ # Go to "Manage Apps", then "Custom Integrations", "Incoming Webhooks"
60+ # Press "Add Configuration", and choose your channel. Now paste it here:
5961slack_webhook_url : " https://hooks.slack.com/services/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"
60- slack_username_override : " ElastAlert"
62+ slack_username_override : " BitSensor Alerting"
63+
64+ # Alert body only cointains a title and text
65+ alert_text_type : alert_text_only
66+
67+ # Link to BitSensor Kibana Dashboard
68+ use_kibana4_dashboard : " https://dev.bitsensor.io/app/kibana#/dashboard/Live-Hacking"
69+
70+ # Enhancement for converting 'detections' array into object, ex. get merged detection type by
71+ # 'detections_parsed.type' or get first detection type by 'detection_parsed.0.type'
72+ match_enhancements :
73+ - " elastalert_modules.bitsensor_enhancement.AlertTextEnhancement"
74+ run_enhancements_first : true
0 commit comments