Skip to content
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/qualys_vmdr/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "6.6.0"
changes:
- description: Add latest transform for Host Detections.
type: enhancement
link: https://github.com/elastic/integrations/pull/13455
- version: "6.5.0"
changes:
- description: Update to v3 API for asset and knowledge_base data streams.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"@timestamp": "2025-02-04T13:41:14.474Z",
"@timestamp": "2025-04-08T09:44:10.009Z",
"agent": {
"ephemeral_id": "fdc43b03-8e0f-41f9-a377-5d8820668401",
"id": "ddaa4708-4109-4d2b-bbca-dc3fa4b8bfb5",
"name": "elastic-agent-15814",
"ephemeral_id": "7e54ee7b-229e-4d8a-b4db-021a9755f3b6",
"id": "a6b5dc9a-fdd8-48e8-93df-bd12211c464a",
"name": "elastic-agent-13786",
"type": "filebeat",
"version": "8.16.0"
"version": "8.18.0"
},
"cloud": {
"instance": {
Expand All @@ -14,25 +14,25 @@
},
"data_stream": {
"dataset": "qualys_vmdr.asset_host_detection",
"namespace": "49337",
"namespace": "92309",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "ddaa4708-4109-4d2b-bbca-dc3fa4b8bfb5",
"snapshot": false,
"version": "8.16.0"
"id": "a6b5dc9a-fdd8-48e8-93df-bd12211c464a",
"snapshot": true,
"version": "8.18.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"host"
"vulnerability"
],
"dataset": "qualys_vmdr.asset_host_detection",
"id": "11111111",
"ingested": "2025-02-04T13:41:17Z",
"ingested": "2025-04-08T09:44:12Z",
"kind": "alert",
"original": "{\"DETECTION_LIST\":{\"AFFECT_RUNNING_KERNEL\":\"0\",\"FIRST_FOUND_DATETIME\":\"2021-02-05T04:50:45Z\",\"IS_DISABLED\":\"0\",\"IS_IGNORED\":\"0\",\"LAST_FIXED_DATETIME\":\"2022-12-14T06:52:57Z\",\"LAST_FOUND_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_PROCESSED_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_TEST_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_UPDATE_DATETIME\":\"2024-03-08T20:15:41Z\",\"QDS\":{\"#text\":\"35\",\"severity\":\"LOW\"},\"QDS_FACTORS\":{\"QDS_FACTOR\":[{\"#text\":\"7.7\",\"name\":\"CVSS\"},{\"#text\":\"v3.x\",\"name\":\"CVSS_version\"},{\"#text\":\"0.00232\",\"name\":\"epss\"},{\"#text\":\"AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"name\":\"CVSS_vector\"}]},\"QID\":\"101\",\"RESULTS\":\"Package\\tInstalled Version\\tRequired Version\\nlinux-cloud-tools-4.4.0\\t1074-aws_4.4.0-1074.84\\t1092\\nlinux-aws-tools-4.4.0\\t1074_4.4.0-1074.84\\t1092\\nlinux-aws-headers-4.4.0\\t1074_4.15.0-1126.135\\t1092\\nlinux-tools-4.4.0\\t1074-aws_4.4.0-1074.84\\t1092\\nlinux-aws-cloud-tools-4.4.0\\t1074_4.4.0-1074.84\\t1092\",\"SEVERITY\":\"3\",\"SSL\":\"0\",\"STATUS\":\"Active\",\"TIMES_FOUND\":\"5393\",\"TYPE\":\"Confirmed\",\"UNIQUE_VULN_ID\":\"11111111\"},\"DNS\":\"adfssrvr.adfs.local\",\"DNS_DATA\":{\"DOMAIN\":\"adfs.local\",\"FQDN\":\"adfssrvr.adfs.local\",\"HOSTNAME\":\"adfssrvr\"},\"ID\":\"1\",\"IP\":\"10.50.2.111\",\"KNOWLEDGE_BASE\":{\"CATEGORY\":\"CGI\",\"CONSEQUENCE\":\"Depending on the vulnerability being exploited, an unauthenticated remote attacker could conduct cross-site scripting, clickjacking or MIME-type sniffing attacks.\",\"CVE_LIST\":[\"CVE-2022-31629\",\"CVE-2022-31628\"],\"DIAGNOSIS\":\"This QID reports the absence of the following\",\"DISCOVERY\":{\"REMOTE\":\"1\"},\"LAST_SERVICE_MODIFICATION_DATETIME\":\"2023-06-29T12:20:46Z\",\"PATCHABLE\":\"0\",\"PCI_FLAG\":\"1\",\"PUBLISHED_DATETIME\":\"2017-06-05T21:34:49Z\",\"QID\":\"101\",\"SEVERITY_LEVEL\":\"2\",\"SOFTWARE_LIST\":{\"SOFTWARE\":[{\"PRODUCT\":\"None\",\"VENDOR\":\"multi-vendor\"}]},\"SOLUTION\":\"\\u003cB\\u003eNote:\\u003c/B\\u003e To better debug the results of this QID\",\"THREAT_INTELLIGENCE\":{\"THREAT_INTEL\":[{\"id\":\"8\"}]},\"TITLE\":\"HTTP Security Header Not Detected\",\"VULN_TYPE\":\"Vulnerability\"},\"LAST_PC_SCANNED_DATE\":\"2023-06-28T09:58:12Z\",\"LAST_SCAN_DATETIME\":\"2023-07-03T06:25:17Z\",\"LAST_VM_SCANNED_DATE\":\"2023-07-03T06:23:47Z\",\"LAST_VM_SCANNED_DURATION\":\"1113\",\"NETBIOS\":\"ADFSSRVR\",\"OS\":\"Windows 2016/2019/10\",\"TRACKING_METHOD\":\"IP\"}",
"type": [
Expand Down Expand Up @@ -140,29 +140,33 @@
"last_vm_scanned_duration": 1113,
"netbios": "ADFSSRVR",
"os": "Windows 2016/2019/10",
"package_nested": {
"fixed_version": [
"1092",
"1092",
"1092",
"1092",
"1092"
],
"name": [
"linux-cloud-tools-4.4.0",
"linux-aws-tools-4.4.0",
"linux-aws-headers-4.4.0",
"linux-tools-4.4.0",
"linux-aws-cloud-tools-4.4.0"
],
"version": [
"1074-aws_4.4.0-1074.84",
"1074_4.4.0-1074.84",
"1074_4.15.0-1126.135",
"1074-aws_4.4.0-1074.84",
"1074_4.4.0-1074.84"
]
},
"package_nested": [
{
"fixed_version": "1092",
"name": "linux-cloud-tools-4.4.0",
"version": "1074-aws_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-tools-4.4.0",
"version": "1074_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-headers-4.4.0",
"version": "1074_4.15.0-1126.135"
},
{
"fixed_version": "1092",
"name": "linux-tools-4.4.0",
"version": "1074-aws_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-cloud-tools-4.4.0",
"version": "1074_4.4.0-1074.84"
}
],
"tracking_method": "IP",
"vulnerability": {
"affect_running_kernel": "0",
Expand Down Expand Up @@ -276,4 +280,4 @@
"severity": "high",
"title": "HTTP Security Header Not Detected"
}
}
}
72 changes: 38 additions & 34 deletions packages/qualys_vmdr/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -125,13 +125,13 @@ An example event for `asset_host_detection` looks as following:

```json
{
"@timestamp": "2025-02-04T13:41:14.474Z",
"@timestamp": "2025-04-08T09:44:10.009Z",
"agent": {
"ephemeral_id": "fdc43b03-8e0f-41f9-a377-5d8820668401",
"id": "ddaa4708-4109-4d2b-bbca-dc3fa4b8bfb5",
"name": "elastic-agent-15814",
"ephemeral_id": "7e54ee7b-229e-4d8a-b4db-021a9755f3b6",
"id": "a6b5dc9a-fdd8-48e8-93df-bd12211c464a",
"name": "elastic-agent-13786",
"type": "filebeat",
"version": "8.16.0"
"version": "8.18.0"
},
"cloud": {
"instance": {
Expand All @@ -140,25 +140,25 @@ An example event for `asset_host_detection` looks as following:
},
"data_stream": {
"dataset": "qualys_vmdr.asset_host_detection",
"namespace": "49337",
"namespace": "92309",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "ddaa4708-4109-4d2b-bbca-dc3fa4b8bfb5",
"snapshot": false,
"version": "8.16.0"
"id": "a6b5dc9a-fdd8-48e8-93df-bd12211c464a",
"snapshot": true,
"version": "8.18.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"host"
"vulnerability"
],
"dataset": "qualys_vmdr.asset_host_detection",
"id": "11111111",
"ingested": "2025-02-04T13:41:17Z",
"ingested": "2025-04-08T09:44:12Z",
"kind": "alert",
"original": "{\"DETECTION_LIST\":{\"AFFECT_RUNNING_KERNEL\":\"0\",\"FIRST_FOUND_DATETIME\":\"2021-02-05T04:50:45Z\",\"IS_DISABLED\":\"0\",\"IS_IGNORED\":\"0\",\"LAST_FIXED_DATETIME\":\"2022-12-14T06:52:57Z\",\"LAST_FOUND_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_PROCESSED_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_TEST_DATETIME\":\"2024-03-08T20:15:41Z\",\"LAST_UPDATE_DATETIME\":\"2024-03-08T20:15:41Z\",\"QDS\":{\"#text\":\"35\",\"severity\":\"LOW\"},\"QDS_FACTORS\":{\"QDS_FACTOR\":[{\"#text\":\"7.7\",\"name\":\"CVSS\"},{\"#text\":\"v3.x\",\"name\":\"CVSS_version\"},{\"#text\":\"0.00232\",\"name\":\"epss\"},{\"#text\":\"AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"name\":\"CVSS_vector\"}]},\"QID\":\"101\",\"RESULTS\":\"Package\\tInstalled Version\\tRequired Version\\nlinux-cloud-tools-4.4.0\\t1074-aws_4.4.0-1074.84\\t1092\\nlinux-aws-tools-4.4.0\\t1074_4.4.0-1074.84\\t1092\\nlinux-aws-headers-4.4.0\\t1074_4.15.0-1126.135\\t1092\\nlinux-tools-4.4.0\\t1074-aws_4.4.0-1074.84\\t1092\\nlinux-aws-cloud-tools-4.4.0\\t1074_4.4.0-1074.84\\t1092\",\"SEVERITY\":\"3\",\"SSL\":\"0\",\"STATUS\":\"Active\",\"TIMES_FOUND\":\"5393\",\"TYPE\":\"Confirmed\",\"UNIQUE_VULN_ID\":\"11111111\"},\"DNS\":\"adfssrvr.adfs.local\",\"DNS_DATA\":{\"DOMAIN\":\"adfs.local\",\"FQDN\":\"adfssrvr.adfs.local\",\"HOSTNAME\":\"adfssrvr\"},\"ID\":\"1\",\"IP\":\"10.50.2.111\",\"KNOWLEDGE_BASE\":{\"CATEGORY\":\"CGI\",\"CONSEQUENCE\":\"Depending on the vulnerability being exploited, an unauthenticated remote attacker could conduct cross-site scripting, clickjacking or MIME-type sniffing attacks.\",\"CVE_LIST\":[\"CVE-2022-31629\",\"CVE-2022-31628\"],\"DIAGNOSIS\":\"This QID reports the absence of the following\",\"DISCOVERY\":{\"REMOTE\":\"1\"},\"LAST_SERVICE_MODIFICATION_DATETIME\":\"2023-06-29T12:20:46Z\",\"PATCHABLE\":\"0\",\"PCI_FLAG\":\"1\",\"PUBLISHED_DATETIME\":\"2017-06-05T21:34:49Z\",\"QID\":\"101\",\"SEVERITY_LEVEL\":\"2\",\"SOFTWARE_LIST\":{\"SOFTWARE\":[{\"PRODUCT\":\"None\",\"VENDOR\":\"multi-vendor\"}]},\"SOLUTION\":\"\\u003cB\\u003eNote:\\u003c/B\\u003e To better debug the results of this QID\",\"THREAT_INTELLIGENCE\":{\"THREAT_INTEL\":[{\"id\":\"8\"}]},\"TITLE\":\"HTTP Security Header Not Detected\",\"VULN_TYPE\":\"Vulnerability\"},\"LAST_PC_SCANNED_DATE\":\"2023-06-28T09:58:12Z\",\"LAST_SCAN_DATETIME\":\"2023-07-03T06:25:17Z\",\"LAST_VM_SCANNED_DATE\":\"2023-07-03T06:23:47Z\",\"LAST_VM_SCANNED_DURATION\":\"1113\",\"NETBIOS\":\"ADFSSRVR\",\"OS\":\"Windows 2016/2019/10\",\"TRACKING_METHOD\":\"IP\"}",
"type": [
Expand Down Expand Up @@ -266,29 +266,33 @@ An example event for `asset_host_detection` looks as following:
"last_vm_scanned_duration": 1113,
"netbios": "ADFSSRVR",
"os": "Windows 2016/2019/10",
"package_nested": {
"fixed_version": [
"1092",
"1092",
"1092",
"1092",
"1092"
],
"name": [
"linux-cloud-tools-4.4.0",
"linux-aws-tools-4.4.0",
"linux-aws-headers-4.4.0",
"linux-tools-4.4.0",
"linux-aws-cloud-tools-4.4.0"
],
"version": [
"1074-aws_4.4.0-1074.84",
"1074_4.4.0-1074.84",
"1074_4.15.0-1126.135",
"1074-aws_4.4.0-1074.84",
"1074_4.4.0-1074.84"
]
},
"package_nested": [
{
"fixed_version": "1092",
"name": "linux-cloud-tools-4.4.0",
"version": "1074-aws_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-tools-4.4.0",
"version": "1074_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-headers-4.4.0",
"version": "1074_4.15.0-1126.135"
},
{
"fixed_version": "1092",
"name": "linux-tools-4.4.0",
"version": "1074-aws_4.4.0-1074.84"
},
{
"fixed_version": "1092",
"name": "linux-aws-cloud-tools-4.4.0",
"version": "1074_4.4.0-1074.84"
}
],
"tracking_method": "IP",
"vulnerability": {
"affect_running_kernel": "0",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
- name: data_stream.type
external: ecs
- name: data_stream.dataset
external: ecs
- name: data_stream.namespace
external: ecs
type: keyword
- name: event.module
external: ecs
type: constant_keyword
value: qualys_vmdr
- name: event.dataset
external: ecs
type: constant_keyword
value: qualys_vmdr.asset_host_detection
- name: '@timestamp'
external: ecs
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
- name: input.type
type: keyword
description: Type of filebeat input.
- name: log.offset
type: long
description: Log offset.
Original file line number Diff line number Diff line change
@@ -0,0 +1,98 @@
# Define ECS constant fields as constant_keyword
- name: observer.vendor
type: constant_keyword
external: ecs
- name: vulnerability.scanner.vendor
type: constant_keyword
external: ecs
# Other ECS fields
- name: agent.ephemeral_id
external: ecs
- name: agent.id
external: ecs
- name: agent.name
external: ecs
- name: agent.type
external: ecs
- name: agent.version
external: ecs
- name: cloud.account.id
external: ecs
- name: cloud.account.name
external: ecs
- name: cloud.availability_zone
external: ecs
- name: cloud.instance.id
external: ecs
- name: cloud.instance.name
external: ecs
- name: cloud.machine.type
external: ecs
- name: cloud.project.id
external: ecs
- name: cloud.project.name
external: ecs
- name: cloud.provider
external: ecs
- name: cloud.region
external: ecs
- name: cloud.service.name
external: ecs
- name: ecs.version
external: ecs
- name: event.agent_id_status
external: ecs
- name: event.category
external: ecs
- name: event.id
external: ecs
- name: event.ingested
external: ecs
- name: event.kind
external: ecs
- name: event.type
external: ecs
- name: host.domain
external: ecs
- name: host.hostname
external: ecs
- name: host.id
external: ecs
- name: host.ip
external: ecs
- name: host.name
external: ecs
- name: host.os.full
external: ecs
- name: host.os.platform
external: ecs
- name: host.os.type
external: ecs
- name: package.name
external: ecs
- name: package.version
external: ecs
- name: related.hosts
external: ecs
- name: related.ip
external: ecs
- name: tags
external: ecs
- name: vulnerability.category
external: ecs
- name: vulnerability.classification
external: ecs
- name: vulnerability.description
external: ecs
- name: vulnerability.enumeration
external: ecs
- name: vulnerability.id
external: ecs
- name: vulnerability.reference
external: ecs
- name: vulnerability.score.base
external: ecs
- name: vulnerability.score.version
external: ecs
- name: vulnerability.severity
external: ecs
Loading