<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ingesting Zimperium Logs in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611586#M77552</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;that's awesome! Would you mind sharing your props.conf?&lt;/P&gt;&lt;P&gt;I've used the&amp;nbsp;syslog pull script provided by Zimperium which outputs in syslog and json - but not having any luck with parsing either formats.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Sep 2022 10:08:43 GMT</pubDate>
    <dc:creator>geoffmoraes</dc:creator>
    <dc:date>2022-09-01T10:08:43Z</dc:date>
    <item>
      <title>How to ingest Zimperium Logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/465731#M57204</link>
      <description>&lt;P&gt;Hi at all,&lt;BR /&gt;I have to ingest Zimperium Logs that are in json format and they are very complicated.&lt;/P&gt;
&lt;P&gt;In splunkbase there's the Zimperium App but there isn't any information about the logs ingestion and no TA.&lt;/P&gt;
&lt;P&gt;Before I start with the logs parsing, had anyone already do it?&lt;BR /&gt;Can you give me some hint?&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;
&lt;P&gt;Ciao.&lt;BR /&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 14:47:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/465731#M57204</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-09-01T14:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: ingesting Zimperium Logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611580#M77550</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;did you figure out a way to ingest Zimperium logs into Splunk?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 10:00:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611580#M77550</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2022-09-01T10:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: ingesting Zimperium Logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611583#M77551</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;we manually solved: there's a script from Zimperium to extract logs from Zimperium and save them in text files.&lt;/P&gt;&lt;P&gt;Then I created my own props.conf and it runs.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 10:04:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611583#M77551</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-09-01T10:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: ingesting Zimperium Logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611586#M77552</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;that's awesome! Would you mind sharing your props.conf?&lt;/P&gt;&lt;P&gt;I've used the&amp;nbsp;syslog pull script provided by Zimperium which outputs in syslog and json - but not having any luck with parsing either formats.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 10:08:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611586#M77552</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2022-09-01T10:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: ingesting Zimperium Logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611589#M77553</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It was two years ago, and something could be old, but see these:&lt;/P&gt;&lt;P&gt;props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# Zimperium

[AttackClass]
LOOKUP-LOOKUP-AttackClass = LKPTBL_AttackClass Name OUTPUT Category

[AttackTypeList]
LOOKUP-LOOKUP-AttackTypeList = LKPTBL_AttackTypeList AttackString OUTPUT AttackDescription

[ZIM_App_list]
LOOKUP-LOOKUP-ZIM_App_list = ZIM_App_list AppName OUTPUT ListType

[mtd]
DATETIME_CONFIG = 
LINE_BREAKER = ([\r\n]+)
MAX_TIMESTAMP_LOOKAHEAD = 23
NO_BINARY_CHECK = true
SHOULD_LINEMERGE = false
TIME_FORMAT = %m %d %Y %H:%M:%S %Z
TIME_PREFIX = \&amp;lt;\d+\&amp;gt;\d+\s+
category = Custom
description = MTD+ logs from Zimperium Cloud
pulldown_type = true
KV_MODE = json
disabled = false

#[Zjson3]
#EXTRACT-device_info = (?ms)\"device_info\":\s*\{\s*\"tag1\":\s*\"(?&amp;lt;tag1&amp;gt;[^\"]*)\",\s*\"device_time":\s*\"(?&amp;lt;device_time&amp;gt;[^\"]*)\",\s*\"app_version\":\s*\"(?&amp;lt;app_version&amp;gt;[^\"]*)\",\s*\"zdid\":\s*\"(?&amp;lt;zdid&amp;gt;[^\"]*)\",\s*\"tag2\":\s*\"(?&amp;lt;tag2&amp;gt;[^\"]*)\",\s*\"os\":\s*\"(?&amp;lt;os&amp;gt;[^\"]*)\",\s*\"app\":\s*\"(?&amp;lt;app&amp;gt;[^\"]*)\",\s+\"jailbroken\":\s*(?&amp;lt;jailbroken&amp;gt;[^,]*),\s*\"operator\":\s+\"(?&amp;lt;operator&amp;gt;[^\"]*)\",\s*\"os_version\":\s*\"(?&amp;lt;os_version&amp;gt;[^\"]*)\",\s*\"mdm_id\":\s*\"(?&amp;lt;mdm_id&amp;gt;[^\"]*)\",\s*\"imei\":\s*\"(?&amp;lt;imei&amp;gt;[^\"]*)\",\s*\"model\":\s*\"(?&amp;lt;model&amp;gt;[^\"]*)\",\s*\"device_id\":\s*\"(?&amp;lt;device_id&amp;gt;[^\"]*)\",\s*\"type\":\s*\"(?&amp;lt;type&amp;gt;[^\"]*)\",\s*\"zapp_instance_id\":\s*\"(?&amp;lt;zapp_instance_id&amp;gt;[^\"]*)\"
#EXTRACT-threat = (?ms)\"threat\":\s*\{\s*\"story\":\s*\"(?&amp;lt;story&amp;gt;[^\"]*)\",\s*\"name\":\s*\"(?&amp;lt;name&amp;gt;[^\"]*)\",\s*\"general\":\s*\{\s*\"time_interval\":\s*\"(?&amp;lt;time_interval&amp;gt;[^\"]*)\",\s*\"network_encryption\":\s*\"(?&amp;lt;network_encryption&amp;gt;[^\"]*)\",\s*\"network\":\s*\"(?&amp;lt;network&amp;gt;[^\"]*)\",\s*\"subnet_mask\":\s*\"(?&amp;lt;subnet_mask&amp;gt;[^\"]*)\",\s*\"external_ip\":\s*\"(?&amp;lt;external_ip&amp;gt;[^\"]*)\",\s*\"device_ip\":\s*\"(?&amp;lt;device_ip&amp;gt;[^\"]*)\",\s*\"device_time\":\s*\"(?&amp;lt;device_time&amp;gt;[^\"]*)\",\s*\"network_bssid\":\s*\"(?&amp;lt;network_bssid&amp;gt;[^\"]*)\",\s*\"gateway_ip\":\s*\"(?&amp;lt;gateway_ip&amp;gt;[^\"]*)\",\s*\"action_triggered\":\s*\"(?&amp;lt;action_triggered&amp;gt;[^\"]*)\",\s*\"malware_list\":\s*\"(?&amp;lt;malware_list&amp;gt;[^\"]*)\",\s*\"basestation\":\s*(?&amp;lt;basestation&amp;gt;[^\,]*),\s*\"threat_type\":\s*\"(?&amp;lt;threat_type&amp;gt;[^\"]*)\",\s*\"network_interface\":\s*\"(?&amp;lt;network_interface&amp;gt;[^\"]*)\"
#EXTRACT-user_info = (?ms)\"user_info\":\s*\{\s*\"employee_name\":\s*\"(?&amp;lt;employee_name&amp;gt;[^\"]+)\",\s*\"user_id\":\s*\"(?&amp;lt;user_id&amp;gt;[^\"]+)\",\s*\"user_role\":\s*\"(?&amp;lt;user_role&amp;gt;[^\"]+)\",\s*\"user_email\":\s*\"(?&amp;lt;user_email&amp;gt;[^\"]+)\",\s*\"user_group":\s*\"(?&amp;lt;user_group&amp;gt;[^\"]+)\"

[zj]
DATETIME_CONFIG = 
LINE_BREAKER = ([\r\n]+)
MAX_TIMESTAMP_LOOKAHEAD = 23
NO_BINARY_CHECK = true
TIME_FORMAT = %m %d %Y %H:%M:%S %Z
TIME_PREFIX = ^\&amp;lt;\d+\&amp;gt;\d+\s+
category = Custom
disabled = false
pulldown_type = true&lt;/LI-CODE&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# Zimperium

[LKPTBL_AttackTypeList]
batch_index_query = 0
case_sensitive_match = 1
filename = LKPTBL_AttackTypeList.csv

[ZIM_App_list]
batch_index_query = 0
case_sensitive_match = 1
filename = ZIM_App_list.csv

[LKPTBL_AttackClass]
batch_index_query = 0
case_sensitive_match = 1
filename = LKPTBL_AttackClass.csv&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 10:19:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611589#M77553</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-09-01T10:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: ingesting Zimperium Logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611700#M77569</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;Thanks for this! It helped me understand how to resolve this.&lt;/P&gt;&lt;P&gt;The syslog pull script provided by Zimperium has its output in JSON. However the output has some sort of header before the first '{' in every event.&lt;/P&gt;&lt;P&gt;Your props.conf uses that header for the TIME_PREFIX&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;TIME_PREFIX = \&amp;lt;\d+\&amp;gt;\d+\s+&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;I was able to get the JSON parsed in Splunk by stripping off the header and using eventtimestamp as the TIME_PREFIX&lt;/P&gt;&lt;P&gt;props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[zj]
DATETIME_CONFIG = 
LINE_BREAKER = ([\r\n]+)
NO_BINARY_CHECK = true
TIME_FORMAT = %m %d %Y %H:%M:%S %Z
TIME_PREFIX = eventtimestamp\":\s\"
category = Custom
description = logs from Zimperium
pulldown_type = true
KV_MODE = json
disabled = false
SEDCMD-StripHeader = s/^\&amp;lt;\d+\&amp;gt;\d+\s+\d+\s+\d+\s\d+\s+\d+:\d+:\d+\s[A-Za-z0-9\s-]+//&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 06:20:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-ingest-Zimperium-Logs/m-p/611700#M77569</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2022-09-02T06:20:33Z</dc:date>
    </item>
  </channel>
</rss>

