Carbon Black EDR¶
About¶
VMware Carbon Black is a cybersecurity company based in Waltham, Massachusetts. The company develops cloud-native endpoint security software that is designed to detect malicious behavior and to help prevent malicious files from attacking an organization.
Product Details¶
Vendor URL: VMware Security Solutions
Product Type: Endpoint Detection and Response
Product Tier: Tier I
Integration Method: Syslog and API
Integration URL: Carbon Black Defense - Cyderes Documentation
Integration URL: Carbon Black Response - Cyderes Documentation
Log Guide: Carbon Black Log Guide
Parser Details¶
Log Format: CEF Syslog and Json
Expected Normalization Rate: 95%
Data Label: CB_EDR
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
action | additional.action |
action | metadata.product_event_type |
alert_severity | security_result.detection_fields.value.alert_severity |
blocked_threat_category | additional.blocked_threat_category |
blocked_threat_category | security_result.detection_fields.value.blocked_threat_category |
cb_server | intermediary.hostname |
child_command_line | target.process.command_line |
child_pid | target.process.pid |
child_process_guid | target.process.product_specific_process_id |
child_username | target.user.userid |
childproc_guid | target.process.product_specific_process_id |
childproc_hash.0 | target.process.file.md5 |
childproc_hash.1 | target.process.file.sha256 |
childproc_pid | target.process.pid |
childproc_reputation | additional.childproc_reputation |
childproc_username | target.user.userid |
column1 | csv_header |
column2 | csv_vendor |
column3 | csv_product |
column4 | csv_version |
column5 | log_version |
column6 | csv_event_type |
column7 | log_level |
column8 | csv_message_details |
command_line | target.process.command_line |
comms_ip | intermediary.port |
computer_name | principal.hostname |
created_by_event_id | additional.created_by_event_id |
crossproc_api | additional.crossproc_api |
crossproc_guid | additional.crossproc_guid |
crossproc_hash.0 | additional.crossproc_md5 |
crossproc_hash.1 | additional.crossproc_sha256 |
crossproc_name | target.process.file.full_path |
crossproc_publisher.0.name | additional.crossproc_publisher_name |
crossproc_publisher.0.state | additional.crossproc_publisher_state |
crossproc_reputation | additional.crossproc_reputation |
crossproc_target | additional.crossproc_target |
device_group | principal.group.group_display_name |
device_internal_ip | additional.device_internal_ip |
device_location | additional.device_location |
deviceInfo.deviceId | about.asset_id |
deviceInfo.deviceName | principal.hostname |
deviceInfo.deviceVersion | principal.platform_version |
deviceInfo.email | principal.user.email_addresses |
deviceInfo.email | principal.user.userid |
deviceInfo.externalIpAddress | principal.nat_ip |
deviceInfo.internalIpAddress | principal.ip, about.ip |
direction | network.direction |
docs.0.cmdline | target.process.command_line |
docs.0.interface_ip | principal.ip |
docs.0.link_process | target.url |
docs.0.parent_guid | target.process.parent_process.product_specific_process_id |
docs.0.parent_name | additional.parent_process_name |
docs.0.parent_pid | target.process.parent_process.pid |
docs.0.path | target.process.file.full_path |
docs.0.process_guid | target.process.product_specific_process_id |
docs.0.process_name | additional.process_name |
docs.0.process_pid | target.process.pid |
docs.0.process_sha256 | additional.process_sha256 |
docs.0.start | additional.start |
docs.0.username | target.user.userid |
domain | principal.administrative_domain |
domain | target.hostname |
event_description | metadata.description |
event_id | additional.event_id |
event_origin | additional.event_origin |
eventDescription | security_result.severity_details |
feed_id | principal.resource.id |
feed_name | principal.resource.name |
feed_name | security_result.description |
file_md5 | principal.process.file.md5 |
file_md5 | target.file.md5 |
file_sha256 | principal.process.file.sha256 |
file_sha256 | target.file.sha256 |
fileless_scriptload_cmdline | additional.fileless_scriptload_cmdline |
fileless_scriptload_cmdline_length | additional.fileless_scriptload_cmdline_length |
fileless_scriptload_hash | additional.fileless_scriptload_hash |
filemod_hash.0 | target.process.file.md5 |
filemod_hash.1 | target.process.file.sha256 |
filemod_name | target.file.full_path |
first_event_time | additional.first_event_time |
group | target.group.group_display_name |
indicator.applicationName | security_result.about.application |
indicator.indicatorName | security_result.threat_name |
indicator.sha256Hash | security_result.about.file.sha256 |
interface_ip | principal.ip |
ioc_attr.direction | network.direction |
ioc_attr.dns_name | additional.dns_name |
ioc_attr.ja3 | additional.ja3 |
ioc_attr.ja3s | additional.ja3s |
ioc_attr.local_ip | about.ip |
ioc_attr.local_port | about.port |
ioc_attr.protocol | network.ip_protocol |
ioc_attr.remote_ip | about.ip |
ioc_attr.remote_port | about.port |
ioc_attrs.highlights.0 | about.resource.name |
ioc_confidence | additional.ioc_confidence |
ioc_hit | additional.ioc_hit |
ioc_id | additional.ioc_id |
ioc_query_index | additional.ioc_query_index |
ioc_query_string | about.resource.name |
ioc_type | about.resource.type |
ioc_value | about.resource.name |
ioc_value | target.ip |
last_event_time | additional.last_event_time |
last_update_time | additional.last_update_time |
link_process | principal.url |
local_ip | principal.ip |
local_port | principal.port |
md5 | principal.process.file.md5 |
md5 | target.file.md5 |
modload_count | security_result.detection_fields.value.modload_count |
modload_effective_reputation | security_result.detection_fields.value.modload_effective_reputation |
modload_md5 | security_result.detection_fields.value.modload_md5 |
modload_name | security_result.detection_fields.value.modload_name |
modload_publisher.0.name | security_result.detection_fields.value.modload_publisher_name |
modload_publisher.0.state | security_result.detection_fields.value.modload_publisher_state |
modload_sha256 | security_result.detection_fields.value.modload_sha256 |
netconn_domain | target.hostname |
netconn_protocol | network.ip_protocol |
netconn_proxy_domain | intermediary.hostname |
netconn_proxy_ip | intermediary.ip |
netconn_proxy_port | intermediary.port |
normalized_device_os | principal.platform |
not_blocked_threat_category | additional.not_blocked_threat_category |
not_blocked_threat_category | security_result.detection_fields.value.not_blocked_threat_category |
os_type | principal.platform |
parent_cmdline | principal.process.parent_process.command_line |
parent_guid | principal.process.parent_process.product_specific_process_id |
parent_hash.0 | principal.process.parent_process.file.md5 |
parent_hash.1 | principal.process.parent_process.file.sha256 |
parent_md5 | principal.process.file.md5 |
parent_md5 | target.file.md5 |
parent_path | principal.process.file.full_path |
parent_path | target.process.file.full_path |
parent_pid | principal.process.pid |
parent_pid | target.process.pid |
parent_process_guid | principal.process.product_specific_process_id |
parent_process_guid | target.process.product_specific_process_id |
path | target.file.full_path |
path | target.registry.registry_key |
pid | principal.process.pid |
pid | target.process.pid |
policy_applied | additional.policy_applied |
policy_id | additional.policy_id |
policy_name | additional.policy_name |
process_cmdline | principal.process.command_line |
process_guid | principal.process.product_specific_process_id |
process_guid | target.process.product_specific_process_id |
process_hash.0 | principal.process.file.md5 |
process_hash.1 | principal.process.file.sha256 |
process_path | principal.process.file.full_path |
process_path | target.process.file.full_path |
process_pid | principal.process.pid |
process_publisher.0.name | additional.process_publisher_name |
process_publisher.0.state | additional.process_publisher_state |
process_reputation | additional.process_reputation |
process_username | principal.user.userid |
protocol | network.ip_protocol |
proxy_domain | observer.hostname |
proxy_ip | observer.ip |
proxy_port | observer.port |
reason | metadata.description |
reason_code | additional.reason_code |
regmod_count | additional.regmod_count |
regmod_key | target.registry.registry_key |
regmod_name | target.registry.registry_key |
regmod_value | target.registry.registry_value_name |
remote_ip | target.ip |
remote_port | target.port |
report_id | additional.report_id |
report_id | security_result.rule_id |
report_id | target.resource.id |
report_name | additional.report_name |
report_score | security_result.about.investigation.severity_score |
report_score | security_result.summary |
requested_access | target.process.access_mask |
run_state | security_result.detection_fields.value.run_state |
scriptload_count | additional.scriptload_count |
scriptload_effective_reputation | additional.scriptload_effective_reputation |
scriptload_publisher.0.state | additional.scriptload_publisher_state |
scriptload_reputation | additional.scriptload_reputation |
sensor_action | security_result.action |
sensor_action | security_result.detection_fields.value.sensor_action |
sensor_id | principal.asset_id |
server_name | intermediary.hostname |
severity | security_result.severity |
sha256 | principal.process.file.sha256 |
sha256 | target.file.sha256 |
size | target.file.size |
status | additional.status |
target_cmdline | target.process.command_line |
target_md5 | target.process.file.md5 |
target_path | target.process.file.full_path |
target_pid | target.process.pid |
target_process_guid | target.process.product_specific_process_id |
target_sha256 | target.process.file.sha256 |
target_value | security_result.detection_fields.value.device_priority |
target_value | security_result.severity |
threat_cause_actor_name | security_result.detection_fields.value.threat_cause_actor_name |
threat_cause_actor_name | security_result.threat_name |
threat_cause_actor_process_pid | additional.threat_cause_actor_pid |
threat_cause_actor_sha256 | security_result.detection_fields.value.threat_cause_actor_sha256 |
threat_cause_cause_event_id | additional.threat_cause_cause_event_id |
threat_cause_reputation | additional.threat_cause_reputation |
threat_cause_threat_category | security_result.detection_fields.value.threat_cause_threat_category |
threat_cause_vector | additional.threat_cause_vector |
threat_id | security_result.threat_id |
threatHunterInfo.incidentId | security_result.threat_id |
threatHunterInfo.md5 | target.process.file.md5 |
threatHunterInfo.processGuid | target.process.product_specific_process_id |
threatHunterInfo.processPath | target.process.file.full_path |
threatHunterInfo.reportName | metadata.description |
threatHunterInfo.score | security_result.about.investigation.severity_score |
threatHunterInfo.sha256 | target.process.file.sha256 |
threatHunterInfo.summary | security_result.summary |
threatHunterInfo.threatCause.threatCategory | security_result.category_details |
threatInfo.incidentId | security_result.threat_id |
threatInfo.score | security_result.about.investigation.severity_score |
threatInfo.summary | metadata.description |
threatInfo.summary | security_result.summary |
threatInfo.threatCause.actorProcessPPid | target.process.pid |
threatInfo.threatCause.detectionGuid | target.process.product_specific_process_id |
timestamp | metadata.event_timestamp |
type | metadata.product_event_type |
url | metadata.url_back_to_product |
username | principal.user.userid |
utf8_on_disk_filename | target.file.full_path |
value_name | target.registry.registry_value_name |
watchlist_id | additional.watchlist_id |
watchlist_name | additional.watchlist_name |
watchlist_name | target.resource.name |
workflow_changed_by | additional.workflow_changed_by |
workflow_comment | additional.workflow_comment |
workflow_remediation | additional.workflow_remediation |
workflow_state | additional.workflow_state |
Product Event Types¶
type, action, report_id, feed_name, eventDescription | threatHunterInfo.score, threatInfo.score | report_score | UDM Event Classification | alerting enabled? |
---|---|---|---|---|
abusech | >= 50 | TRUE | ||
alert.watchlist.hit.ingress.process | STATUS_UNCATEGORIZED | |||
alienvault | >= 50 | TRUE | ||
all events | >= 5 | TRUE | ||
all other events | GENERIC_EVENT | |||
binary_info | FILE_UNCATEGORIZED | |||
CB_ANALYTICS | PROCESS_UNCATEGORIZED | |||
create | FILE_CREATION | |||
delete | FILE_DELETION | |||
endpoint.event.apicall | PROCESS_UNCATEGORIZED | |||
endpoint.event.fileless_scriptload | STATUS_UNCATEGORIZED | |||
endpoint.event.filemod | FILE_MODIFICATION | |||
endpoint.event.moduleload | PROCESS_UNCATEGORIZED | |||
endpoint.event.netconn | NETWORK_CONNECTION | |||
endpoint.event.netconn_proxy | NETWORK_CONNECTION | |||
endpoint.event.procend | PROCESS_TERMINATION | |||
endpoint.event.procstart | PROCESS_LAUNCH | |||
endpoint.event.regmod | REGISTRY_CREATION, REGISTRY_DELETION, REGISTRY_MODIFICATION | |||
endpoint.event.scriptload | STATUS_UNCATEGORIZED | |||
endpoint.event.volume | SETTING_MODIFICATION | |||
feed.ingress.hit.process | STATUS_UNCATEGORIZED | |||
feed.query.hit.process | PROCESS_UNCATEGORIZED | |||
feed.storage.hit.process | PROCESS_UNCATEGORIZED | |||
ingress.event.childproc | PROCESS_LAUNCH | |||
ingress.event.corssprocopen | PROCESS_OPEN | |||
ingress.event.moduleload | PROCESS_UNCATEGORIZED | |||
ingress.event.netconn | NETWORK_CONNECTION | |||
ingress.event.procend | PROCESS_TERMINATION | |||
ingress.event.procstart | PROCESS_LAUNCH | |||
ingress.event.regmod | REGISTRY_CREATION, REGISTRY_DELETION, REGISTRY_MODIFICATION | |||
ingress.event.remotethread | PROCESS_UNCATEGORIZED | |||
lastwrite | FILE_MODIFICATION | |||
malicioushost | >= 50 | TRUE | ||
THREAT | PROCESS_UNCATEGORIZED | |||
Threat | TRUE | |||
WATCHLIST | PROCESS_UNCATEGORIZED | |||
watchlist.hit.process | PROCESS_UNCATEGORIZED | |||
write | FILE_MODIFICATION |
Log Sample¶
{"threatInfo":{"indicators":[{"applicationName":"rtagent.exe","indicatorName":"RUN_CMD_SHELL","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"},{"applicationName":"rtservice.exe","indicatorName":"ACTIVE_SERVER","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"},{"applicationName":"rtservice.exe","indicatorName":"UNKNOWN_APP","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"},{"indicatorName":"NETWORK_ACCESS","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3","applicationName":"rtservice.exe"},{"applicationName":"rtagent.exe","indicatorName":"UNKNOWN_APP","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"},{"applicationName":"rtagent.exe","indicatorName":"MITRE_T1059_CMD_LINE_OR_SCRIPT_INTER","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"}],"threatCause":{"reputation":"NOT_LISTED","parentGuid":null,"threatCategory":"NEW_MALWARE","originSourceType":"UNKNOWN","actorName":"rtservice.exe","processGuid":"NWLSW-010459","reason":"R_NET_SERVER","actorType":null,"detectionGuid":"5676939-ades","causeEventId":"4165c544997311ec838177311e89ab46","actor":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3","actorProcessPPid":"2847869691"},"incidentId":"0xsad012-hqy72","score":3,"summary":"The application rtservice.exe acted as a network server.","time":1646148391607},"eventDescription":"[CYDERES-CHRONICLE] [Carbon Black has detected a threat against your company.] [website2.domain.com] [The application rtservice.exe acted as a network server.] [Incident id: 0xsad012-hqy72] [Threat score: 3] [Group: Standard] [Email: johndoe] [Name: Hostname1] [Type and OS: WINDOWS Server 2012 R2 x64] [Severity: Monitored]\n","url":"website.domain.com","eventTime":1646148074285,"deviceInfo":{"targetPriorityCode":0,"uemId":"","externalIpAddress":"10.0.0.15","deviceId":222258,"deviceName":"Hostname1","email":"johndoe","deviceHostName":null,"targetPriorityType":"MEDIUM","internalIpAddress":"10.0.0.14","groupName":"Standard","deviceType":"WINDOWS","deviceVersion":"Server 2012 R2 x64"},"ruleName":"CYDERES-CHRONICLE","type":"THREAT"}
Sample Parsing¶
metadata.event_timestamp = "2022-03-01T15:21:14.285Z"
metadata.event_type = "PROCESS_UNCATEGORIZED"
metadata.vendor_name = "Carbon Black"
metadata.product_name = "EDR"
metadata.product_event_type = "THREAT"
metadata.description = "The application rtservice.exe acted as a network server."
metadata.url_back_to_product = "website.domain.com"
metadata.ingested_timestamp = "2022-03-01T15:39:39.875741Z"
principal.hostname = "Hostname1"
principal.user.userid = "johndoe"
principal.platform = "WINDOWS"
principal.ip = "10.0.0.14"
principal.platform_version = "Server 2012 R2 x64"
principal.nat_ip = "10.0.0.15"
principal.asset.ip = "10.0.0.14"
target.process.pid = "2847869691"
target.process.product_specific_process_id = "CB:5676939-ades"
about.asset_id = "CB:222258"
about.ip = "10.0.0.14"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "RUN_CMD_SHELL"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "ACTIVE_SERVER"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "UNKNOWN_APP"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "NETWORK_ACCESS"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "UNKNOWN_APP"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "MITRE_T1059_CMD_LINE_OR_SCRIPT_INTER"
security_result.about.investigation.severity_score = 3
security_result.category_details = "NEW_MALWARE"
security_result.summary = "The application rtservice.exe acted as a network server."
security_result.severity_details = "Monitored"
security_result.threat_id = "0xsad012-hqy72"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.
Rules¶
Coming Soon