Skip to content

Cisco Secure Workload

Cisco Secure Workload

About

Today’s networks include applications running in a hybrid multicloud environment that uses bare-metal, virtualized, cloud-based and container-based workloads. A key challenge is how to better secure applications and data without compromising agility. Cisco Secure Workload (formerly known as Cisco Tetration) is designed to address this security challenge by providing comprehensive workload protection by bringing security closer to applications and tailoring the security posture based on the application behavior. Secure Workload achieves this by using advanced machine learning and behavior analysis techniques.

Product Details

Vendor URL: Cisco Secure Workload

Product Type: Application Security

Product Tier: Tier III

Integration Method: Syslog

Integration URL: Cisco Secure Workload

Log Guide: Cisco Secure Workload

Parser Details

Log Format: Syslog

Expected Normalization Rate: near 99%

Data Label: CISCO_SECURE_WORKLOAD

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
Cisco metadata.vendor_name
Secure Workload metadata.product_name
GENERIC_EVENT metadata.event_type
keyId metadata.product_log_id
type metadata.product_event_type
rule.name metadata.description
observer intermediary.hostname
details.HostName principal.hostname
details.HostName principal.asset.hostname
details.IP principal.ip
forensic.Follow Process - Parent Command Line principal.process.parent_process.command_line
forensic.Process Info - Command String principal.process.command_line
forensic.Follow Process - Username principal.user.userid
details.Platform principal.platform_version
severity security_result.severity
alertText security_result.description

Product Event Types

Description metadata.event_type
All Events GENERIC_EVENT

Log Sample

<3>2022-10-25T20:46:25Z computername Tetration Alert[18]: [ERR] {"keyId":"3717502e9a1c5ce71e7cd2aac33f67f66dc57578:5fd121ea497d4f089251ec60:5fd121ee497d4f1a154c6bc5:1592:FOLLOW_PROCESS",  "eventTime": "1666730615930",  "alertTime": "1666730740505",  "alertText": "T1003 - Credential Dumping - Registry on HOSTNAME",  "severity": "HIGH",  "tenantId": "7003","type": "FORENSICS","alertDetails": "{"Sensor Id":"3717502e9a1c5ce71e7cd2aac33f67f66dc57578","Hostname":"HOSTNAME","Process Id":1592,"scope_id":"5fd121ea497d4f089251ec60","forensic":{"Process Info - Command String":"C:\Windows\system32\reg.exe  export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall "C:\Program Files (x86)\UEMS_Agent\logs\uninstall.reg"","Process Info - Exec Path":"C:\Windows\System32\reg.exe","Follow Process":"true","Follow Process - Parent Username":"DOMAIN\HOSTNAME$","Follow Process - Parent Command Line":"C:\Windows\system32\cmd.exe /C C:\Windows\system32\reg.exe export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall "C:\Program Files (x86)\UEMS_Agent\logs\uninstall.reg"","Follow Process - Parent Exec Path":"C:\Windows\System32\cmd.exe","Follow Process - Username":"DOMAIN\HOSTNAME$","Follow Process - Process Start Time Since Last File Changed (microseconds)":"129735050698057"},"profile":{"id":"5fd121ee497d4f1a154c6bcf","name":"MITRE ATTu0026CK Profile","created_at":1607541230,"updated_at":1607541230,"root_app_scope_id":"5fd121ea497d4f089251ec60"},"rule":{"id":"5fd121ee497d4f1a154c6bc5","name":"T1003 - Credential Dumping - Registry","clause_chips":"[{"type":"filter","facet":{"field":"event_type","title":"Event type","type":"STRING"},"operator":{"label":"u003d","type":"eq"},"displayValue":"Follow Process","value":"Follow Process"},{"type":"operator","value":"and"},{"type":"filter","facet":{"field":"forensic_event__process_info__exec_path","title":"Process Info - Exec Path","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"reg.exe","value":"reg.exe"},{"type":"operator","value":"and"},{"type":"(","value":"("},{"type":"(","value":"("},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"save","value":"save"},{"type":"operator","value":"or"},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"export","value":"export"},{"type":")","value":")"},{"type":"operator","value":"and"},{"type":"(","value":"("},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"hklm","value":"hklm"},{"type":"operator","value":"or"},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"hkey_local_machine","value":"hkey_local_machine"},{"type":")","value":")"},{"type":"operator","value":"and"},{"type":"(","value":"("},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"sam","value":"sam"},{"type":"operator","value":"or"},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"security","value":"security"},{"type":"operator","value":"or"},{"type":"filter","facet":{"field":"forensic_event__process_info__command_string","title":"Process Info - Command String","type":"STRING"},"operator":{"label":"contains","type":"contains"},"displayValue":"system","value":"system"},{"type":")","value":")"},{"type":")","value":")"}]","created_at":1607541230,"updated_at":1607541230,"root_app_scope_id":"5fd121ea497d4f089251ec60"}}","rootScopeId": "5fd121ea497d4f089251ec60"}

Sample Parsing

metadata.product_log_id = "3717502e9a1c5ce71e7cd2aac33f67f66dc57578:5fd121ea497d4f089251ec60:5fd121ee497d4f1a154c6bc5:1592:FOLLOW_PROCESS"
metadata.event_type = "GENERIC_EVENT"
metadata.vendor_name = "Cisco"
metadata.product_name = "Secure Workload"
metadata.description = "T1003 - Credential Dumping - Registry"
principal.hostname = "HOSTNAME"
principal.user.userid = "DOMAIN\HOSTNAME$"
principal.process.command_line = "C:\Windows\system32\reg.exe  export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall "C:\Program Files (x86)\UEMS_Agent\logs\uninstall.reg""
principal.process.parent_process.command_line = "C:\Windows\system32\cmd.exe /C C:\Windows\system32\reg.exe export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall "C:\Program Files (x86)\UEMS_Agent\logs\uninstall.reg""
principal.asset.hostname = "HOSTNAME"
intermediary.hostname = "computername"
security_result.description = "T1003 - Credential Dumping - Registry on HOSTNAME"
security_result.severity = "HIGH"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon