Skip to content

CryptoSpike

CryptoSpike

About

Based on full access transparency, CryptoSpike detects unusual activities in your file system and blocks attacks in real time. In the event of a ransomware attack, the granular restore function makes it possible to restore affected files immediately.

Product Details

Vendor URL: CryptoSpike

Product Type: SaaS

Product Tier: Tier III

Integration Method: Syslog

Integration URL: Cryptospike Integration guide

Parser Details

Log Format: JSON

Expected Normalization Rate: 100%

Data Label: CRYPTOSPIKE

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
agent principal.hostname
context.addedEntries security_result.detection_fields
context.additionalInformation.blocklistHits security_result.detection_fields
context.additionalInformation.files.0.displayFilePath target.file.full_path
context.blockUnblockInfo.blockRuleMatches.0 security_result.rule_name
context.blockUnblockInfo.comment security_result.summary
context.blockUnblockInfo.csInstanceIp observer.ip
context.blockUnblockInfo.csInstanceName observer.hostname
context.changelogLink additional.fields
context.distinguishedName target.user.group_identifiers
context.downloadLink target.url
context.downloadLinkSigned additional.fields
context.emailAddress target.email
context.environmentInformation.clusterName target.resource.name
context.md5 target.file.md5
context.name target.user.user_display_name
context.product target.application
context.resolvedState security_result.threat_status
context.sha512 security_result.detection_fields
context.userGUID target.user.attribute.labels
context.userId target.user.userid
context.userIp target.ip
context.userName target.hostname
context.userPrincipalName target.user.email_addresses
context.version target.asset.software.version
details security_result.description
entityAction.0.action security_result.action_details
entityAction.0.entity additional.fields
entityAction.0.entityKey additional.fields
key metadata.product_event_type
message metadata.description
service principal.application
service target.resource.name
severity security_result.severity_details

Product Event Types

Event UDM Event Classification
application-update-available STATUS_UPDATE
blocked-user USER_UNCATEGORIZED
blocklist-update SETTING_MODIFICATION
Generic GENERIC_EVENT
user-login-successful USER_LOGIN

Log Sample

<134>Feb  1 00:47:02 10.100.0.46 {"key":"blocked-user","agent":"ABC123","service":"event-analyzer","timestamp":"2024-02-01T00:47:02.758136203Z","entityAction":[{"entity":"TENANT","entityKey":"1","action":""}],"severity":"INFO","context":{"changedTimestamp":"2024-01-28T13:04:11Z","distinguishedName":"CN=Vlog Admin,OU=Admin Users,OU=ABCD,DC=example,DC=local","emailAddress":null,"name":"Vlog Admin","resolvedState":"RESOLVED","samAccountName":"EXAMPLE","tenantId":1,"userGUID":"a12b3c4d-123abc-abcd1234-1234","userId":"S-1-5-21-12345678-12345678-12345678-1234","userIdType":"WINDOWS","userIp":"10.0.0.0","userName":"EXAMPLE","userPrincipalName":"EXAMPLE@example.de","blockUnblockInfo":{"timestamp":"2024-02-01T00:47:02.741988017Z","csUserName":null,"storageUserName":null,"comment":"Triggered blocklist hit rule.","blockRuleMatches":["pdb"],"blockedFiles":["\\\\example\\VLOG\\file\\example\\240131_2023.14_master\\master\\MHP.Carrier.HVS.pdb"],"csInstanceIp":"10.0.0.0","csInstanceName":"cryptospikeagent-2-shared-network.internal"},"environmentInformation":{"clusterName":"examplecloudnetapp","serverName":"svm_examplecloudnetapp","volumeName":"VLOG","shareName":"VLOG"},"additionalInformation":{"eventMode":"ACTIVE","instanceId":null,"blocklistHitsDurationInSeconds":5,"files":[{"filePath":"/example/example/x.14_master/master/MHP.Carrier.HVS.pdb","displayFilePath":"\\\\\\\\example\\VLOG\\file\\example\\x.14_master\\master\\MHP.Carrier.HVS.pdb","renameToPath":null,"configurationItemId":3402,"externalConfigurationItemId":null,"blockListItem":"pdb","clusterName":"examplecloudnetapp","serverName":"svm_examplecloudnetapp","volumeName":"VLOG","shareName":"VLOG"}],"adjustedBlocklistHitsLimit":false,"blocklistHits":5}},"message":"User blocked","details":"User was blocked"}

Sample Parsing

metadata.event_type = "USER_UNCATEGORIZED"
metadata.vendor_name = "ProLion"
metadata.product_name = "CryptoSpike"
metadata.product_version = "3.2.2"
metadata.product_event_type = "blocked-user"
metadata.description = "User blocked"
additional.fields["entity"] = "TENANT"
additional.fields["entityKey"] = "1"
principal.hostname = "ABC123"
principal.ip = "10.100.0.46"
principal.application = "event-analyzer"
target.hostname = "EXAMPLE"
target.user.userid = "a12b3c4d-123abc-abcd1234-1234"
target.user.user_display_name = "Vlog Admin"
target.user.attribute.labels["userGUID"] = "a12b3c4d-123abc-abcd1234-1234"
target.user.group_identifiers = "CN=Vlog Admin,OU=Admin Users,OU=ABCD,DC=example,DC=local"
target.user.email_addresses = "EXAMPLE@example.de"
target.ip = "10.0.0.0"
target.file.full_path = "\\\\\\\\example\\VLOG\\file\\example\\240131_2023.14_master\\master\\MHP.Carrier.HVS.pdb"
target.resource.name = "examplecloudnetapp"
observer.hostname = "cryptospikeagent-2-shared-network.internal"
observer.ip = "10.0.0.0"
security_result.rule_name = "pdb"
security_result.detection_fields.key = "blocklistHits"
security_result.detection_fields.value = "5"
security_result.summary = "Triggered blocklist hit rule."
security_result.description = "User was blocked"
security_result.severity = "INFORMATIONAL"
security_result.severity_details = "INFO"
security_result.threat_status = "CLEARED"