Carbon Black EDR¶

About¶
VMware Carbon Black is a cybersecurity company based in Waltham, Massachusetts. The company develops cloud-native endpoint security software that is designed to detect malicious behavior and to help prevent malicious files from attacking an organization.
Product Details¶
Vendor URL: VMware Security Solutions
Product Type: Endpoint Detection and Response
Product Tier: Tier I
Integration Method: Syslog and API
Integration URL: Carbon Black Defense - Cyderes Documentation
Integration URL: Carbon Black Response - Cyderes Documentation
Log Guide: Carbon Black Log Guide
Parser Details¶
Log Format: CEF Syslog and Json
Expected Normalization Rate: 95%
Data Label: CB_EDR
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| action | additional.action |
| action | metadata.product_event_type |
| alert_severity | security_result.detection_fields.value.alert_severity |
| blocked_threat_category | additional.blocked_threat_category |
| blocked_threat_category | security_result.detection_fields.value.blocked_threat_category |
| cb_server | intermediary.hostname |
| child_command_line | target.process.command_line |
| child_pid | target.process.pid |
| child_process_guid | target.process.product_specific_process_id |
| child_username | target.user.userid |
| childproc_guid | target.process.product_specific_process_id |
| childproc_hash.0 | target.process.file.md5 |
| childproc_hash.1 | target.process.file.sha256 |
| childproc_pid | target.process.pid |
| childproc_reputation | additional.childproc_reputation |
| childproc_username | target.user.userid |
| column1 | csv_header |
| column2 | csv_vendor |
| column3 | csv_product |
| column4 | csv_version |
| column5 | log_version |
| column6 | csv_event_type |
| column7 | log_level |
| column8 | csv_message_details |
| command_line | target.process.command_line |
| comms_ip | intermediary.port |
| computer_name | principal.hostname |
| created_by_event_id | additional.created_by_event_id |
| crossproc_api | additional.crossproc_api |
| crossproc_guid | additional.crossproc_guid |
| crossproc_hash.0 | additional.crossproc_md5 |
| crossproc_hash.1 | additional.crossproc_sha256 |
| crossproc_name | target.process.file.full_path |
| crossproc_publisher.0.name | additional.crossproc_publisher_name |
| crossproc_publisher.0.state | additional.crossproc_publisher_state |
| crossproc_reputation | additional.crossproc_reputation |
| crossproc_target | additional.crossproc_target |
| device_group | principal.group.group_display_name |
| device_internal_ip | additional.device_internal_ip |
| device_location | additional.device_location |
| deviceInfo.deviceId | about.asset_id |
| deviceInfo.deviceName | principal.hostname |
| deviceInfo.deviceVersion | principal.platform_version |
| deviceInfo.email | principal.user.email_addresses |
| deviceInfo.email | principal.user.userid |
| deviceInfo.externalIpAddress | principal.nat_ip |
| deviceInfo.internalIpAddress | principal.ip, about.ip |
| direction | network.direction |
| docs.0.cmdline | target.process.command_line |
| docs.0.interface_ip | principal.ip |
| docs.0.link_process | target.url |
| docs.0.parent_guid | target.process.parent_process.product_specific_process_id |
| docs.0.parent_name | additional.parent_process_name |
| docs.0.parent_pid | target.process.parent_process.pid |
| docs.0.path | target.process.file.full_path |
| docs.0.process_guid | target.process.product_specific_process_id |
| docs.0.process_name | additional.process_name |
| docs.0.process_pid | target.process.pid |
| docs.0.process_sha256 | additional.process_sha256 |
| docs.0.start | additional.start |
| docs.0.username | target.user.userid |
| domain | principal.administrative_domain |
| domain | target.hostname |
| event_description | metadata.description |
| event_id | additional.event_id |
| event_origin | additional.event_origin |
| eventDescription | security_result.severity_details |
| feed_id | principal.resource.id |
| feed_name | principal.resource.name |
| feed_name | security_result.description |
| file_md5 | principal.process.file.md5 |
| file_md5 | target.file.md5 |
| file_sha256 | principal.process.file.sha256 |
| file_sha256 | target.file.sha256 |
| fileless_scriptload_cmdline | additional.fileless_scriptload_cmdline |
| fileless_scriptload_cmdline_length | additional.fileless_scriptload_cmdline_length |
| fileless_scriptload_hash | additional.fileless_scriptload_hash |
| filemod_hash.0 | target.process.file.md5 |
| filemod_hash.1 | target.process.file.sha256 |
| filemod_name | target.file.full_path |
| first_event_time | additional.first_event_time |
| group | target.group.group_display_name |
| indicator.applicationName | security_result.about.application |
| indicator.indicatorName | security_result.threat_name |
| indicator.sha256Hash | security_result.about.file.sha256 |
| interface_ip | principal.ip |
| ioc_attr.direction | network.direction |
| ioc_attr.dns_name | additional.dns_name |
| ioc_attr.ja3 | additional.ja3 |
| ioc_attr.ja3s | additional.ja3s |
| ioc_attr.local_ip | about.ip |
| ioc_attr.local_port | about.port |
| ioc_attr.protocol | network.ip_protocol |
| ioc_attr.remote_ip | about.ip |
| ioc_attr.remote_port | about.port |
| ioc_attrs.highlights.0 | about.resource.name |
| ioc_confidence | additional.ioc_confidence |
| ioc_hit | additional.ioc_hit |
| ioc_id | additional.ioc_id |
| ioc_query_index | additional.ioc_query_index |
| ioc_query_string | about.resource.name |
| ioc_type | about.resource.type |
| ioc_value | about.resource.name |
| ioc_value | target.ip |
| last_event_time | additional.last_event_time |
| last_update_time | additional.last_update_time |
| link_process | principal.url |
| local_ip | principal.ip |
| local_port | principal.port |
| md5 | principal.process.file.md5 |
| md5 | target.file.md5 |
| modload_count | security_result.detection_fields.value.modload_count |
| modload_effective_reputation | security_result.detection_fields.value.modload_effective_reputation |
| modload_md5 | security_result.detection_fields.value.modload_md5 |
| modload_name | security_result.detection_fields.value.modload_name |
| modload_publisher.0.name | security_result.detection_fields.value.modload_publisher_name |
| modload_publisher.0.state | security_result.detection_fields.value.modload_publisher_state |
| modload_sha256 | security_result.detection_fields.value.modload_sha256 |
| netconn_domain | target.hostname |
| netconn_protocol | network.ip_protocol |
| netconn_proxy_domain | intermediary.hostname |
| netconn_proxy_ip | intermediary.ip |
| netconn_proxy_port | intermediary.port |
| normalized_device_os | principal.platform |
| not_blocked_threat_category | additional.not_blocked_threat_category |
| not_blocked_threat_category | security_result.detection_fields.value.not_blocked_threat_category |
| os_type | principal.platform |
| parent_cmdline | principal.process.parent_process.command_line |
| parent_guid | principal.process.parent_process.product_specific_process_id |
| parent_hash.0 | principal.process.parent_process.file.md5 |
| parent_hash.1 | principal.process.parent_process.file.sha256 |
| parent_md5 | principal.process.file.md5 |
| parent_md5 | target.file.md5 |
| parent_path | principal.process.file.full_path |
| parent_path | target.process.file.full_path |
| parent_pid | principal.process.pid |
| parent_pid | target.process.pid |
| parent_process_guid | principal.process.product_specific_process_id |
| parent_process_guid | target.process.product_specific_process_id |
| path | target.file.full_path |
| path | target.registry.registry_key |
| pid | principal.process.pid |
| pid | target.process.pid |
| policy_applied | additional.policy_applied |
| policy_id | additional.policy_id |
| policy_name | additional.policy_name |
| process_cmdline | principal.process.command_line |
| process_guid | principal.process.product_specific_process_id |
| process_guid | target.process.product_specific_process_id |
| process_hash.0 | principal.process.file.md5 |
| process_hash.1 | principal.process.file.sha256 |
| process_path | principal.process.file.full_path |
| process_path | target.process.file.full_path |
| process_pid | principal.process.pid |
| process_publisher.0.name | additional.process_publisher_name |
| process_publisher.0.state | additional.process_publisher_state |
| process_reputation | additional.process_reputation |
| process_username | principal.user.userid |
| protocol | network.ip_protocol |
| proxy_domain | observer.hostname |
| proxy_ip | observer.ip |
| proxy_port | observer.port |
| reason | metadata.description |
| reason_code | additional.reason_code |
| regmod_count | additional.regmod_count |
| regmod_key | target.registry.registry_key |
| regmod_name | target.registry.registry_key |
| regmod_value | target.registry.registry_value_name |
| remote_ip | target.ip |
| remote_port | target.port |
| report_id | additional.report_id |
| report_id | security_result.rule_id |
| report_id | target.resource.id |
| report_name | additional.report_name |
| report_score | security_result.about.investigation.severity_score |
| report_score | security_result.summary |
| requested_access | target.process.access_mask |
| run_state | security_result.detection_fields.value.run_state |
| scriptload_count | additional.scriptload_count |
| scriptload_effective_reputation | additional.scriptload_effective_reputation |
| scriptload_publisher.0.state | additional.scriptload_publisher_state |
| scriptload_reputation | additional.scriptload_reputation |
| sensor_action | security_result.action |
| sensor_action | security_result.detection_fields.value.sensor_action |
| sensor_id | principal.asset_id |
| server_name | intermediary.hostname |
| severity | security_result.severity |
| sha256 | principal.process.file.sha256 |
| sha256 | target.file.sha256 |
| size | target.file.size |
| status | additional.status |
| target_cmdline | target.process.command_line |
| target_md5 | target.process.file.md5 |
| target_path | target.process.file.full_path |
| target_pid | target.process.pid |
| target_process_guid | target.process.product_specific_process_id |
| target_sha256 | target.process.file.sha256 |
| target_value | security_result.detection_fields.value.device_priority |
| target_value | security_result.severity |
| threat_cause_actor_name | security_result.detection_fields.value.threat_cause_actor_name |
| threat_cause_actor_name | security_result.threat_name |
| threat_cause_actor_process_pid | additional.threat_cause_actor_pid |
| threat_cause_actor_sha256 | security_result.detection_fields.value.threat_cause_actor_sha256 |
| threat_cause_cause_event_id | additional.threat_cause_cause_event_id |
| threat_cause_reputation | additional.threat_cause_reputation |
| threat_cause_threat_category | security_result.detection_fields.value.threat_cause_threat_category |
| threat_cause_vector | additional.threat_cause_vector |
| threat_id | security_result.threat_id |
| threatHunterInfo.incidentId | security_result.threat_id |
| threatHunterInfo.md5 | target.process.file.md5 |
| threatHunterInfo.processGuid | target.process.product_specific_process_id |
| threatHunterInfo.processPath | target.process.file.full_path |
| threatHunterInfo.reportName | metadata.description |
| threatHunterInfo.score | security_result.about.investigation.severity_score |
| threatHunterInfo.sha256 | target.process.file.sha256 |
| threatHunterInfo.summary | security_result.summary |
| threatHunterInfo.threatCause.threatCategory | security_result.category_details |
| threatInfo.incidentId | security_result.threat_id |
| threatInfo.score | security_result.about.investigation.severity_score |
| threatInfo.summary | metadata.description |
| threatInfo.summary | security_result.summary |
| threatInfo.threatCause.actorProcessPPid | target.process.pid |
| threatInfo.threatCause.detectionGuid | target.process.product_specific_process_id |
| timestamp | metadata.event_timestamp |
| type | metadata.product_event_type |
| url | metadata.url_back_to_product |
| username | principal.user.userid |
| utf8_on_disk_filename | target.file.full_path |
| value_name | target.registry.registry_value_name |
| watchlist_id | additional.watchlist_id |
| watchlist_name | additional.watchlist_name |
| watchlist_name | target.resource.name |
| workflow_changed_by | additional.workflow_changed_by |
| workflow_comment | additional.workflow_comment |
| workflow_remediation | additional.workflow_remediation |
| workflow_state | additional.workflow_state |
Product Event Types¶
| type, action, report_id, feed_name, eventDescription | threatHunterInfo.score, threatInfo.score | report_score | UDM Event Classification | alerting enabled? |
|---|---|---|---|---|
| abusech | >= 50 | TRUE | ||
| alert.watchlist.hit.ingress.process | STATUS_UNCATEGORIZED | |||
| alienvault | >= 50 | TRUE | ||
| all events | >= 5 | TRUE | ||
| all other events | GENERIC_EVENT | |||
| binary_info | FILE_UNCATEGORIZED | |||
| CB_ANALYTICS | PROCESS_UNCATEGORIZED | |||
| create | FILE_CREATION | |||
| delete | FILE_DELETION | |||
| endpoint.event.apicall | PROCESS_UNCATEGORIZED | |||
| endpoint.event.fileless_scriptload | STATUS_UNCATEGORIZED | |||
| endpoint.event.filemod | FILE_MODIFICATION | |||
| endpoint.event.moduleload | PROCESS_UNCATEGORIZED | |||
| endpoint.event.netconn | NETWORK_CONNECTION | |||
| endpoint.event.netconn_proxy | NETWORK_CONNECTION | |||
| endpoint.event.procend | PROCESS_TERMINATION | |||
| endpoint.event.procstart | PROCESS_LAUNCH | |||
| endpoint.event.regmod | REGISTRY_CREATION, REGISTRY_DELETION, REGISTRY_MODIFICATION | |||
| endpoint.event.scriptload | STATUS_UNCATEGORIZED | |||
| endpoint.event.volume | SETTING_MODIFICATION | |||
| feed.ingress.hit.process | STATUS_UNCATEGORIZED | |||
| feed.query.hit.process | PROCESS_UNCATEGORIZED | |||
| feed.storage.hit.process | PROCESS_UNCATEGORIZED | |||
| ingress.event.childproc | PROCESS_LAUNCH | |||
| ingress.event.corssprocopen | PROCESS_OPEN | |||
| ingress.event.moduleload | PROCESS_UNCATEGORIZED | |||
| ingress.event.netconn | NETWORK_CONNECTION | |||
| ingress.event.procend | PROCESS_TERMINATION | |||
| ingress.event.procstart | PROCESS_LAUNCH | |||
| ingress.event.regmod | REGISTRY_CREATION, REGISTRY_DELETION, REGISTRY_MODIFICATION | |||
| ingress.event.remotethread | PROCESS_UNCATEGORIZED | |||
| lastwrite | FILE_MODIFICATION | |||
| malicioushost | >= 50 | TRUE | ||
| THREAT | PROCESS_UNCATEGORIZED | |||
| Threat | TRUE | |||
| WATCHLIST | PROCESS_UNCATEGORIZED | |||
| watchlist.hit.process | PROCESS_UNCATEGORIZED | |||
| write | FILE_MODIFICATION |
Log Sample¶
{"threatInfo":{"indicators":[{"applicationName":"rtagent.exe","indicatorName":"RUN_CMD_SHELL","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"},{"applicationName":"rtservice.exe","indicatorName":"ACTIVE_SERVER","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"},{"applicationName":"rtservice.exe","indicatorName":"UNKNOWN_APP","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"},{"indicatorName":"NETWORK_ACCESS","sha256Hash":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3","applicationName":"rtservice.exe"},{"applicationName":"rtagent.exe","indicatorName":"UNKNOWN_APP","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"},{"applicationName":"rtagent.exe","indicatorName":"MITRE_T1059_CMD_LINE_OR_SCRIPT_INTER","sha256Hash":"aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"}],"threatCause":{"reputation":"NOT_LISTED","parentGuid":null,"threatCategory":"NEW_MALWARE","originSourceType":"UNKNOWN","actorName":"rtservice.exe","processGuid":"NWLSW-010459","reason":"R_NET_SERVER","actorType":null,"detectionGuid":"5676939-ades","causeEventId":"4165c544997311ec838177311e89ab46","actor":"afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3","actorProcessPPid":"2847869691"},"incidentId":"0xsad012-hqy72","score":3,"summary":"The application rtservice.exe acted as a network server.","time":1646148391607},"eventDescription":"[CYDERES-CHRONICLE] [Carbon Black has detected a threat against your company.] [website2.domain.com] [The application rtservice.exe acted as a network server.] [Incident id: 0xsad012-hqy72] [Threat score: 3] [Group: Standard] [Email: johndoe] [Name: Hostname1] [Type and OS: WINDOWS Server 2012 R2 x64] [Severity: Monitored]\n","url":"website.domain.com","eventTime":1646148074285,"deviceInfo":{"targetPriorityCode":0,"uemId":"","externalIpAddress":"10.0.0.15","deviceId":222258,"deviceName":"Hostname1","email":"johndoe","deviceHostName":null,"targetPriorityType":"MEDIUM","internalIpAddress":"10.0.0.14","groupName":"Standard","deviceType":"WINDOWS","deviceVersion":"Server 2012 R2 x64"},"ruleName":"CYDERES-CHRONICLE","type":"THREAT"}
Sample Parsing¶
metadata.event_timestamp = "2022-03-01T15:21:14.285Z"
metadata.event_type = "PROCESS_UNCATEGORIZED"
metadata.vendor_name = "Carbon Black"
metadata.product_name = "EDR"
metadata.product_event_type = "THREAT"
metadata.description = "The application rtservice.exe acted as a network server."
metadata.url_back_to_product = "website.domain.com"
metadata.ingested_timestamp = "2022-03-01T15:39:39.875741Z"
principal.hostname = "Hostname1"
principal.user.userid = "johndoe"
principal.platform = "WINDOWS"
principal.ip = "10.0.0.14"
principal.platform_version = "Server 2012 R2 x64"
principal.nat_ip = "10.0.0.15"
principal.asset.ip = "10.0.0.14"
target.process.pid = "2847869691"
target.process.product_specific_process_id = "CB:5676939-ades"
about.asset_id = "CB:222258"
about.ip = "10.0.0.14"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "RUN_CMD_SHELL"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "ACTIVE_SERVER"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "UNKNOWN_APP"
security_result.about.file.sha256 = "afa8e97b33807248b7d7fa9a16ad44ab01d22a676f61abf2a211807239784dd3"
security_result.about.application = "rtservice.exe"
security_result.threat_name = "NETWORK_ACCESS"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "UNKNOWN_APP"
security_result.about.file.sha256 = "aeaacee8306d6ce88e238f5b6c623fa6e63a4f2c5429096841e9d17c4c4ad4db"
security_result.about.application = "rtagent.exe"
security_result.threat_name = "MITRE_T1059_CMD_LINE_OR_SCRIPT_INTER"
security_result.about.investigation.severity_score = 3
security_result.category_details = "NEW_MALWARE"
security_result.summary = "The application rtservice.exe acted as a network server."
security_result.severity_details = "Monitored"
security_result.threat_id = "0xsad012-hqy72"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.