All Apps and Add-ons

Cylance Protect data integration with Enterprise Security ES

smitra_splunk
Splunk Employee
Splunk Employee

Hi,

I need to use the Cylance Protect syslog data in Enterprise Security.

Has anyone used this data in ES context ? What data models does the data to map to and whether any additional field extractions are required ?
Just an FYI - I'm receiving the following Cylance Protect sourcetypes. The Cylance TA and App are able to parse and display data and information respectively.
syslog_audit_log
syslog_device
syslog_script_control

Any pointers/directions are appreciated!

Best Regards,
Shreedeep Mitra.

1 Solution

darrenfuller
Contributor

Hi Shreedeep,

The TA has three CIM aligned Event Types:

Event type one:. protect_alert. CIM DM: Alerts

[protect_alert]
search = eventtype=cylance_index sourcetype=audit_log

Event type two:. protect_malware. CIM DM: Malware -> Attacks

[protect_malware]
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Threat) OR sourcetype=threat OR sourcetype=exploit

Event type three:. protect_inventory. CIM DMs: Inventory -> Network, Inventory -> OS, Inventory -> User

[protect_inventory]
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Device) OR sourcetype=device

View solution in original post

0 Karma

darrenfuller
Contributor

Hi Shreedeep,

The TA has three CIM aligned Event Types:

Event type one:. protect_alert. CIM DM: Alerts

[protect_alert]
search = eventtype=cylance_index sourcetype=audit_log

Event type two:. protect_malware. CIM DM: Malware -> Attacks

[protect_malware]
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Threat) OR sourcetype=threat OR sourcetype=exploit

Event type three:. protect_inventory. CIM DMs: Inventory -> Network, Inventory -> OS, Inventory -> User

[protect_inventory]
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Device) OR sourcetype=device

0 Karma

smitra_splunk
Splunk Employee
Splunk Employee

Thank you!

0 Karma

smitra_splunk
Splunk Employee
Splunk Employee

Just a follow-up based on observations of the eventtypes.conf , props.conf and transforms.conf --

The eventtypes.conf refer to sourcetype names that are slightly different from those that are being set by transforms.conf. Could this be a bug ?

transforms.conf derives these sourcetype names (below) which are used by props.conf -
syslog_audit_log, syslog_threat_classification, syslog_exploit, syslog_app_control, syslog_threat, syslog_device, syslog_device_control, syslog_script_control

eventtypes.conf refer to these sourcetype names (below)-
audit_log, console_syslog, threat, exploit, device

0 Karma

darrenfuller
Contributor

Not a bug.. look in the props.conf entry for syslog_protect sourcetype for example...

[syslog_protect]
TRANSFORMS-changesourcetype = set_auditlog_sourcetype
TRANSFORMS-changesourcetype2 = set_threatclassification_sourcetype
TRANSFORMS-changesourcetype3 = set_exploit_sourcetype
TRANSFORMS-changesourcetype4 = set_appcontrol_sourcetype
TRANSFORMS-changesourcetype5 = set_threat_sourcetype
TRANSFORMS-changesourcetype6 = set_device_sourcetype
TRANSFORMS-changesourcetype7 = set_devicecontrol_sourcetype
TRANSFORMS-changesourcetype8 = set_scriptcontrol_sourcetype

looking in the transforms.conf... set_auditlog_sourcetype looks like this:

[set_auditlog_sourcetype]
REGEX = Event\sType:\s+AuditLog
FORMAT = sourcetype::syslog_audit_log
DEST_KEY = MetaData:Sourcetype

So , they reroute the syslog_* sourcetypes to others based on regex matching.

0 Karma

smitra_splunk
Splunk Employee
Splunk Employee

I'm trying to dry run this ...

based on the log excerpt below ... (redacted IPs and usernames)
"Oct 3 09:18:00 ec2-xx-xx-xxx-xx.compute-1.amazonaws.com 1 2017-10-03T14:17:59.8346483Z sysloghost CylancePROTECT - - - Event Type: AuditLog, Event Name: LoginSuccess, Message: Provider: CylancePROTECT, Source IP: yyy.yyy.yy.yyy, User: John Doe (jdoe@foo.com)"

... the transforms.conf will set the sourcetype to syslog_audit_log , right ?
But the eventtypes.conf definition refers to it as "audit_log". Correct me if I'm wrong.
[protect_alert]
priority = 5
search = eventtype=cylance_index sourcetype=audit_log

0 Karma

darrenfuller
Contributor

OK... I took a deeper look at the app and you're correct, something doesn't jive.

eventtypes has this:

[cylance_index]
search = index=protect OR index=cylance_protect

[protect_alert]
priority = 5
search = eventtype=cylance_index sourcetype=audit_log

[protect_malware]
priority = 5
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Threat) OR sourcetype=threat OR sourcetype=exploit

[protect_inventory]
priority = 5
search = eventtype=cylance_index (sourcetype=console_syslog AND EventType=Device) OR sourcetype=device

on each of the protect_* searches, it has all of them looking at sourcetype=console_syslog, with eventtype, or looking at (exploit|device) by themselves.. not looking at syslog_exploit or syslog_device.. etc.

you're gonna have to do some minor surgery to fix this,. (Be a peach & advise the dev as well. )

0 Karma

smitra_splunk
Splunk Employee
Splunk Employee

I'm working around this bug/glitch/typo in the Cylance TA with modifying the eventtypes.conf with a copy in the local dir.

The bigger change will be in the Cylance App which has queries using with mixed sourcetypes - i.e. audit_log and syslog_autid_log etc. I'm going to inform the App developer.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud | Customer Survey!

If you use Splunk Observability Cloud, we invite you to share your valuable insights with us through a brief ...

.conf23 | Get Your Cybersecurity Defense Analyst Certification in Vegas

We’re excited to announce a new Splunk certification exam being released at .conf23! If you’re going to Las ...

Starting With Observability: OpenTelemetry Best Practices

Tech Talk Starting With Observability: OpenTelemetry Best Practices Tuesday, October 17, 2023   |  11AM PST / ...