[
https://issues.apache.org/jira/browse/METRON-327?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Keren Tseytlin updated METRON-327:
----------------------------------
Description:
Create a parser for Cylance logs.
Sample Cylance Device log line:
<116>Jul 8 17:48:40 sysloghost CylancePROTECT Event Type: Device, Event Name:
SystemSecurity, Device Name: a0999b134871, Agent Version: 1.2.1350.541, IP
Address: (291.390.9.143), MAC Address: (A9987B134871, CE9F7E54EAA1), Logged On
Users: (harrypotter), OS: MAC OS X El Capitan 10.11.5 x64 10.11.5#015
Data after parsing:
{code:none}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016, 17:48:40",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "Device",
"event_name": "SystemSecurity",
"device_name": "a0999b134871",
"agent_version": "1.2.1350.541",
"ip_addresses": "291.390.9.143",
"mac_addresses": "A9987B134871, CE9F7E54EAA1",
"users": "harrypotter",
"operating_system": "MAC OS X El Capitan 10.11.5 x64 10.11.5"
}
{code}
Sample Cylance ThreatClassification log line:
<116>Jul 8 17:47:42 sysloghost CylancePROTECT Event Type: ThreatClassification,
Event Name: ResearchSaved, Threat Class: PUP, Threat Subclass: Adware, SHA256:
E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9, MD5:
689A96F71161190A819X0X9D7341I9B#015
Data after parsing:
{code:none}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016 17:47:42",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "ThreatClassification",
"event_name": "ResearchSaved",
"threat_class": "PUP",
"threat_subclass": "Adware",
"sha256":
"E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9",
"md5": "689A96F71161190A819X0X9D7341I9B"
}
{code}
Sample Cylance Threat log line:
<116>Jul 8 17:50:30 sysloghost CylancePROTECT Event Type: Threat, Event Name:
corrupt_found, Device Name: DEP5CG6987D2F, IP Address: (222.765.9.8,
2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109), File Name: olivanders,
Path: c:\program files (x86)\chamberofsecrets\net wand provider for
harry\15.00\help\, Drive Type: None, SHA256:
AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6, MD5: ,
Status: Corrupt, Cylance Score: 0, Found Date: 7/8/2016 5:50:30 PM, File Type:
Executable, Is Running: False, Auto Run: False, Detected By: FileWatcher#015
Data after parsing:
{code:none}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016, 17:50:30",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "Threat",
"event_name": "corrupt_found",
"device_name": "DEP5CG6987D2F",
"ip_addresses": "222.765.9.8, 2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109",
"file_name": "olivanders",
"path": "c:\program files (x86)\chamberofsecrets\net wand provider for
harry\15.00\help\",
"drive_type": "None",
"sha256":
"AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6",
"status": "Corrupt",
"cylance_score": "0",
"found_data": "7/8/2016 5:50:30 PM",
"file_type": "Executable",
"is_running": "False",
"auto_run": "False",
"detected_by": "FileWatcher"
}
{code}
Sample Cylance Repeated log line:
<116>Jul 8 17:47:22 sysloghost CylancePROTECT message repeated 2 times: [Event
Type: ThreatClassification, Event Name: ResearchSaved, Threat Class: PUP,
Threat Subclass: Adware, SHA256:
E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9, MD5:
689A96F71098726A8193D8P0X8341E6B #015]
Data after parsing:
{code:none}
{
"priority": "116",
"timestamp": "July 8th 2016 17:47:22",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"repeat_count": "2",
"event_type": "ThreatClassification",
"event_name": "ResearchSaved",
"threat_class": "PUP",
"threat_subclass": "Adware",
"sha256":
"E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9",
"md5": "689A96F71098726A8193D8P0X8341E6B"
}
{code}
was:
Create a parser for Cylance logs.
Sample Cylance Device log line:
<116>Jul 8 17:48:40 sysloghost CylancePROTECT Event Type: Device, Event Name:
SystemSecurity, Device Name: a0999b134871, Agent Version: 1.2.1350.541, IP
Address: (291.390.9.143), MAC Address: (A9987B134871, CE9F7E54EAA1), Logged On
Users: (harrypotter), OS: MAC OS X El Capitan 10.11.5 x64 10.11.5#015
Data after parsing:
{code:json}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016, 17:48:40",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "Device",
"event_name": "SystemSecurity",
"device_name": "a0999b134871",
"agent_version": "1.2.1350.541",
"ip_addresses": "291.390.9.143",
"mac_addresses": "A9987B134871, CE9F7E54EAA1",
"users": "harrypotter",
"operating_system": "MAC OS X El Capitan 10.11.5 x64 10.11.5"
}
{code}
Sample Cylance ThreatClassification log line:
<116>Jul 8 17:47:42 sysloghost CylancePROTECT Event Type: ThreatClassification,
Event Name: ResearchSaved, Threat Class: PUP, Threat Subclass: Adware, SHA256:
E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9, MD5:
689A96F71161190A819X0X9D7341I9B#015
Data after parsing:
{code:json}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016 17:47:42",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "ThreatClassification",
"event_name": "ResearchSaved",
"threat_class": "PUP",
"threat_subclass": "Adware",
"sha256":
"E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9",
"md5": "689A96F71161190A819X0X9D7341I9B"
}
{code}
Sample Cylance Threat log line:
<116>Jul 8 17:50:30 sysloghost CylancePROTECT Event Type: Threat, Event Name:
corrupt_found, Device Name: DEP5CG6987D2F, IP Address: (222.765.9.8,
2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109), File Name: olivanders,
Path: c:\program files (x86)\chamberofsecrets\net wand provider for
harry\15.00\help\, Drive Type: None, SHA256:
AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6, MD5: ,
Status: Corrupt, Cylance Score: 0, Found Date: 7/8/2016 5:50:30 PM, File Type:
Executable, Is Running: False, Auto Run: False, Detected By: FileWatcher#015
Data after parsing:
{code:json}
{
"source:type": "cylance",
"priority": "116",
"timestamp": "July 8th 2016, 17:50:30",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"event_type": "Threat",
"event_name": "corrupt_found",
"device_name": "DEP5CG6987D2F",
"ip_addresses": "222.765.9.8, 2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109",
"file_name": "olivanders",
"path": "c:\program files (x86)\chamberofsecrets\net wand provider for
harry\15.00\help\",
"drive_type": "None",
"sha256":
"AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6",
"status": "Corrupt",
"cylance_score": "0",
"found_data": "7/8/2016 5:50:30 PM",
"file_type": "Executable",
"is_running": "False",
"auto_run": "False",
"detected_by": "FileWatcher"
}
{code}
Sample Cylance Repeated log line:
<116>Jul 8 17:47:22 sysloghost CylancePROTECT message repeated 2 times: [Event
Type: ThreatClassification, Event Name: ResearchSaved, Threat Class: PUP,
Threat Subclass: Adware, SHA256:
E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9, MD5:
689A96F71098726A8193D8P0X8341E6B #015]
Data after parsing:
{code:json}
{
"priority": "116",
"timestamp": "July 8th 2016 17:47:22",
"hostname": "sysloghost",
"process": "CylancePROTECT",
"repeat_count": "2",
"event_type": "ThreatClassification",
"event_name": "ResearchSaved",
"threat_class": "PUP",
"threat_subclass": "Adware",
"sha256":
"E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9",
"md5": "689A96F71098726A8193D8P0X8341E6B"
}
{code}
> Create Cylance Parser
> ---------------------
>
> Key: METRON-327
> URL: https://issues.apache.org/jira/browse/METRON-327
> Project: Metron
> Issue Type: New Feature
> Reporter: Keren Tseytlin
> Priority: Minor
>
> Create a parser for Cylance logs.
> Sample Cylance Device log line:
> <116>Jul 8 17:48:40 sysloghost CylancePROTECT Event Type: Device, Event Name:
> SystemSecurity, Device Name: a0999b134871, Agent Version: 1.2.1350.541, IP
> Address: (291.390.9.143), MAC Address: (A9987B134871, CE9F7E54EAA1), Logged
> On Users: (harrypotter), OS: MAC OS X El Capitan 10.11.5 x64 10.11.5#015
> Data after parsing:
> {code:none}
> {
> "source:type": "cylance",
> "priority": "116",
> "timestamp": "July 8th 2016, 17:48:40",
> "hostname": "sysloghost",
> "process": "CylancePROTECT",
> "event_type": "Device",
> "event_name": "SystemSecurity",
> "device_name": "a0999b134871",
> "agent_version": "1.2.1350.541",
> "ip_addresses": "291.390.9.143",
> "mac_addresses": "A9987B134871, CE9F7E54EAA1",
> "users": "harrypotter",
> "operating_system": "MAC OS X El Capitan 10.11.5 x64 10.11.5"
> }
> {code}
> Sample Cylance ThreatClassification log line:
> <116>Jul 8 17:47:42 sysloghost CylancePROTECT Event Type:
> ThreatClassification, Event Name: ResearchSaved, Threat Class: PUP, Threat
> Subclass: Adware, SHA256:
> E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9, MD5:
> 689A96F71161190A819X0X9D7341I9B#015
> Data after parsing:
> {code:none}
> {
> "source:type": "cylance",
> "priority": "116",
> "timestamp": "July 8th 2016 17:47:42",
> "hostname": "sysloghost",
> "process": "CylancePROTECT",
> "event_type": "ThreatClassification",
> "event_name": "ResearchSaved",
> "threat_class": "PUP",
> "threat_subclass": "Adware",
> "sha256":
> "E6D8C4F1484BB5T2G89PR9EC91048F4DE533DC3CB37C13021077DD8C564C81F9",
> "md5": "689A96F71161190A819X0X9D7341I9B"
> }
> {code}
> Sample Cylance Threat log line:
> <116>Jul 8 17:50:30 sysloghost CylancePROTECT Event Type: Threat, Event Name:
> corrupt_found, Device Name: DEP5CG6987D2F, IP Address: (222.765.9.8,
> 2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
> 2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109), File Name:
> olivanders, Path: c:\program files (x86)\chamberofsecrets\net wand provider
> for harry\15.00\help\, Drive Type: None, SHA256:
> AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6, MD5: ,
> Status: Corrupt, Cylance Score: 0, Found Date: 7/8/2016 5:50:30 PM, File
> Type: Executable, Is Running: False, Auto Run: False, Detected By:
> FileWatcher#015
> Data after parsing:
> {code:none}
> {
> "source:type": "cylance",
> "priority": "116",
> "timestamp": "July 8th 2016, 17:50:30",
> "hostname": "sysloghost",
> "process": "CylancePROTECT",
> "event_type": "Threat",
> "event_name": "corrupt_found",
> "device_name": "DEP5CG6987D2F",
> "ip_addresses": "222.765.9.8, 2600:1003:b02c:f691:7c70:e3d0:1303:ff9c,
> 2600:1003:b02c:f691:80f4:59ba:8412:2648, 234.19.56.109",
> "file_name": "olivanders",
> "path": "c:\program files (x86)\chamberofsecrets\net wand provider for
> harry\15.00\help\",
> "drive_type": "None",
> "sha256":
> "AD123456F9B97E4EEAEF987654143FEFAB39106B707857C48PB085B8AD6E90E6",
> "status": "Corrupt",
> "cylance_score": "0",
> "found_data": "7/8/2016 5:50:30 PM",
> "file_type": "Executable",
> "is_running": "False",
> "auto_run": "False",
> "detected_by": "FileWatcher"
> }
> {code}
> Sample Cylance Repeated log line:
> <116>Jul 8 17:47:22 sysloghost CylancePROTECT message repeated 2 times:
> [Event Type: ThreatClassification, Event Name: ResearchSaved, Threat Class:
> PUP, Threat Subclass: Adware, SHA256:
> E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9, MD5:
> 689A96F71098726A8193D8P0X8341E6B #015]
> Data after parsing:
> {code:none}
> {
> "priority": "116",
> "timestamp": "July 8th 2016 17:47:22",
> "hostname": "sysloghost",
> "process": "CylancePROTECT",
> "repeat_count": "2",
> "event_type": "ThreatClassification",
> "event_name": "ResearchSaved",
> "threat_class": "PUP",
> "threat_subclass": "Adware",
> "sha256":
> "E6D8C4F1234BB3F1B25FA9EC91048F4DE098DC3CB37C13021077DD8C765C81F9",
> "md5": "689A96F71098726A8193D8P0X8341E6B"
> }
> {code}
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)