Cybereason EDR¶

About¶
The Cybereason XDR Platform moves beyond endless alerting to instead recognize, expose, and end malicious operations before they take hold. The result: Defenders can end attacks in minutes.
Product Details¶
Vendor URL: Cybereason EDR
Product Type: Endpoint Detection and Response
Product Tier: Tier I
Integration Method: Custom
Integration URL: Cybereason EDR - Cyderes Documentation
Log Guide: N/A
Parser Details¶
Log Format: JSON
Expected Normalization Rate: 95%
Data Label: CYBEREASON_EDR
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| description | ioc.description |
| description | metadata.description |
| description | security_result.summary |
| detectionEngine | principal.application |
| detectionEngine | security_result.description |
| detectionValue | security_result.threat_id |
| detectionValueType | security_result.description |
| detectionValueType | security_result.threat_name |
| direction | network.direction |
| domain | security_result.about.administrative_domain |
| domainName | target.administrative_domain |
| elementDisplayName | security_result.about.registry.registry_value_name |
| elementDisplayName | security_result.description |
| extendedDisplayId | security_result.about.user.user_display_name |
| file | target.process.file.full_path |
| filePath | target.file.full_path |
| guid | metadata.product_log_id |
| id.malwareType | security_result.summary |
| local_ip | principal.ip |
| localAddressString | principal.ip |
| machineName | principal.hostname |
| machineName | target.hostname |
| maliciousClassification | security_result.severity_details |
| malop_connection.elementValues.domainName.elementValues.0.name | ioc.domain_and_ports.domain |
| malop_connection.elementValues.ownerMachine.elementValues.0.name | ioc.feed_name |
| malop_connection.elementValues.ownerMachine.elementValues.0.name | principal.hostname |
| malop_connection.elementValues.ownerProcess.elementValues.0.guid | principal.process.product_specific_process_id |
| malop_connection.elementValues.ownerProcess.elementValues.0.name | target.file.full_path |
| malop_connection.elementValues.ownerProcess.user.elementValues.0.guid | principal.user.userid |
| malop_connection.elementValues.ownerProcess.user.elementValues.0.name | principal.user.user_display_name |
| malop_connection.elementValues.remoteAddress.elementValues.0.name | target.ip |
| malop_connection.guidString | metadata.product_log_id |
| malop_connection.simpleValues.localPort.values.0 | principal.port |
| malop_connection.simpleValues.receivedBytesCount.values.0 | network.received_bytes |
| malop_connection.simpleValues.remoteAddressCountryName.values.0 | target.location.country_or_region |
| malop_connection.simpleValues.remotePort.values.0 | target.port |
| malop_connection.simpleValues.transmittedBytesCount.values.0 | network.sent_bytes |
| malop_connection.simpleValues.transportProtocol.values.0 | network.ip_protocol |
| malop_data.malopPriority | security_result.priority |
| malop_data.simpleValues.detectionType.values.0 | security_result.threat_name |
| malop_data.simpleValues.elementDisplayName.values.0 | metadata.product_event_type |
| malop_process.elementValues.calculatedUser.elementValues.0.guid | principal.user.userid |
| malop_process.elementValues.calculatedUser.elementValues.0.name | principal.user.user_display_name |
| malop_process.elementValues.ownerMachine.elementValues.0.name | principal.hostname |
| malop_process.elementValues.parentProcess.elementValues.0.guid | principal.process.product_specific_parent_process_id |
| malop_process.elementValues.self.elementValues.0.guid | principal.process.product_specific_process_id |
| malop_process.elementValues.self.elementValues.0.guid | target.process.pid |
| malop_process.guidString | metadata.product_log_id |
| malop_process.simpleValues.calculatedName.values.0 | principal.process.file.full_path |
| malop_process.simpleValues.calculatedName.values.0 | target.file.full_path |
| malop_process.simpleValues.calculatedName.values.0 | target.process.file.full_path |
| malop_process.simpleValues.commandLine.values.0 | principal.process.command_line |
| malop_process.simpleValues.imageFile.md5String.values.0 | target.file.md5 |
| malop_process.simpleValues.imageFile.sha1String.values.0 | target.file.sha1 |
| malop_severity | ioc.raw_severity |
| malop_severity | security_result.severity |
| malop_status | security_result.description |
| malop_url | metadata.url_back_to_product |
| malop_url | security_result.url_back_to_product |
| malop_url | target.url |
| malop_user.simpleValues.passwordAgeDays.values.0 | security_result.description |
| malop_user.simpleValues.privileges.values.0 | security_result.description |
| malwareDataModel.detectionName | security_result.rule_name |
| malwareDataModel.filePath | principal.process.command_line |
| malwareDataModel.filePath | target.process.file.full_path |
| malwareDataModel.processName | principal.process.file.full_path |
| name | principal.process.file.full_path |
| name | security_result.about.registry.registry_key |
| name | security_result.summary |
| name | security_result.threat_name |
| name | target.file.full_path |
| needsAttention | security_result.threat_status |
| ownerMachine | principal.hostname |
| path | security_result.about.file.full_path |
| portType | network.application_protocol |
| processName | principal.process.file.full_path |
| receivedBytesCount | network.received_bytes |
| recordType | metadata.product_event_type |
| remoteAddressCountryName | target.location.country_or_region |
| remotePort | target.port |
| score | security_result.about.investigation.severity_score |
| self | observer.hostname |
| serverAddress | target.ip |
| servicePort | principal.port |
| sizeOfImage | target.file.size |
| sourceDomain | principal.administrative_domain |
| state | metadata.product_event_type |
| state | security_result.summary |
| status | security_result.about.investigation.comments |
| targetIpAddress | target.ip |
| timestamp | metadata.event_timestamp |
| transmittedBytesCount | network.sent_bytes |
| transportProtocol | network.ip_protocol |
| type | metadata.product_event_type |
| user | principal.user.userid |
| username | principal.user.user_display_name |
| value | security_result.about.registry.registry_value_data |
Product Event Types¶
| event_type, type | needsAttention, status, is_alert | UDM Event Type | Security Result Category | alerting |
|---|---|---|---|---|
| all other events | GENERIC_EVENT | |||
| malop | SOFTWARE_MALICIOUS | |||
| MALWARE | SCAN_HOST | |||
| Malware | SCAN_HOST | |||
| NETWORK_CONNECTION | NETWORK_CONNECTION | |||
| PROCESS_OPEN | PROCESS_OPEN | |||
| Detected | TRUE | |||
| Prevented | TRUE | |||
| TRUE | TRUE |
Log Sample¶
{"detectionEngine":"Script","detectionValue":"amsi_as_pastebin","detectionValueType":"DVT_SIGNATURE","elementType":"Process","guid":"194560-10150662","id":{"elementType":"Process","guid":"194560-10150662","malwareType":"FilelessMalware","timestamp":1646479827420},"machineName":"Hostname1","malwareDataModel":{"@class":".FilelessMalwareDataModel","description":"EXECUTE_MALICIOUS_ACTIVITY","detectionRule":"amsi_as_pastebin","module":"amsi_as_pastebin","processName":"cscript.exe","url":null},"name":"SDT_PS_EXECUTE_MALICIOUS_ACTIVITY","needsAttention":false,"referenceElementType":"Process","referenceGuid":"194560-10150662","schedulerScan":false,"score":null,"status":"Prevented","timestamp":1646479827420,"type":"FilelessMalware"}
Sample Parsing¶
metadata.product_log_id = "194560-10150662"
metadata.event_timestamp = "2022-03-05T11:30:27Z"
metadata.event_type = "SCAN_HOST"
metadata.vendor_name = "Cybereason"
metadata.product_name = "Cybereason EDR"
metadata.product_event_type = "FilelessMalware"
metadata.ingested_timestamp = "2022-03-05T11:48:02.804128Z"
principal.hostname = "Hostname1"
principal.process.file.full_path = "cscript.exe"
principal.application = "Script"
principal.asset.hostname = "Hostname1"
security_result.about.investigation.comments = "Prevented"
security_result.threat_name = "SDT_PS_EXECUTE_MALICIOUS_ACTIVITY"
security_result.summary = "FilelessMalware"
security_result.description = "DVT_SIGNATURE"
security_result.severity = "HIGH"
security_result.confidence = "HIGH_CONFIDENCE"
security_result.priority = "HIGH_PRIORITY"
security_result.threat_id = "amsi_as_pastebin"
security_result.threat_status = "CLEARED"
security_result.alert_state = "ALERTING"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.