Log Types: CarbonBlack

Overview

Carbon Black is a system monitor that injects itself into several windows system calls, and can use signatures and holistic analysis to forward data on potential attack indications.

The CarbonBlack event forwarder sends JSON events to the Snare Server, encapsulated in a non-complaint version of RFC 5424.

The syslog collection subsystem can process this as a RFC5424 message, if it is configured to ignore the lack of a syslog version code near the start of the message.

The JSON content presented by the carbon black agent, is not formally structured across event types, and is therefore not suitable for JSON extraction directly to a predetermined structure.

  • https://developer.carbonblack.com/reference/enterprise-response/event-forwarder/event-schema/

As such, much of the content of the Carbon Black event, is placed in a generic 'strings' container, with the following general exceptions, which are reasonably consistent across events:

  • Date

  • Time

  • System

  • Event ID/Type

The JSON Message will be flattened into a dot-separated-key / value pair, with four spaces used as a delimiter.

Sample Events

<158> 2016-08-12T07:08:09+10:30 ws1100 cb-event-forwarder[7862]: {"alert_severity":3.375,"alert_type":"watchlist.hit.ingress.process","cb_server":"cbserver","childproc_count":2,"comms_ip":"10.1.15.7","computer_name":"win2012r2vendor","created_time":"2018-11-05T04:00:18.878195Z","crossproc_count":3,"feed_id":22,"feed_name":"attackframework","feed_rating":3.0,"filemod_count":0,"group":"default group","hostname":"win2012r2vendor","interface_ip":"10.1.15.7","ioc_confidence":0.5,"ioc_query_index":"events","ioc_query_string":"(modload:crypt32.dll -process_name:mscorsvw.exe -process_name:logonui.exe -process_name:taskhost.exe -process_name:mobsync.exe -process_name:googleupdate.exe -process_name:upd.exe -process_name:audiodg.exe -process_name:wmiprvse.exe -process_name:chrome.exe -process_name:svchost.exe -process_name:backgroundtaskhost.exe -process_name:searchprotocolhost.exe)","ioc_type":"query","ioc_value":"{\"index_type\": \"events\", \"search_query\": \"cb.urlver=1\u0026q=(modload%3Acrypt32.dll%20-process_name%3Amscorsvw.exe%20-process_name%3Alogonui.exe%20-process_name%3Ataskhost.exe%20-process_name%3Amobsync.exe%20-process_name%3Agoogleupdate.exe%20-process_name%3Aupd.exe%20-process_name%3Aaudiodg.exe%20-process_name%3Awmiprvse.exe%20-process_name%3Achrome.exe%20-process_name%3Asvchost.exe%20-process_name%3Abackgroundtaskhost.exe%20-process_name%3Asearchprotocolhost.exe)\"}","md5":"B2FA87E8F814BF08E1599B6B2FDC9720","modload_count":46,"netconn_count":2,"os_type":"windows","process_guid":"00000001-0000-0f34-01d4-74bb4b95c9f1","process_id":"00000001-0000-0f34-01d4-74bb4b95c9f1","process_name":"configure-smremoting.exe","process_path":"c:\\windows\\system32\\configure-smremoting.exe","process_unique_id":"00000001-0000-0f34-01d4-74bb4b95c9f1-0166e20743b2","regmod_count":0,"report_score":5,"segment_id":"1","sensor_criticality":3.0,"sensor_id":1,"status":"Unresolved","timestamp":1541390418.89,"type":"alert.watchlist.hit.ingress.process","unique_id":"c2d001a8-b9d3-4bf7-a4e3-be8de308f2cb","username":"WIN2012R2VENDOR\\Administrator","watchlist_id":"565652","watchlist_name":"565652"}

Identification

The string 'cb-event-forwarder' will be included with syslog messages.

Fields

Field

Description

Field

Description

DATE

Event date, in the format YYYY-MM-DD

TIME

Event time, in the format HH:MM:SS

SYSTEM

The source system

TABLE

CarbonBlack

TYPE

Alert type

STRINGS

The first message highlighted below in the 'samples' section below, will be converted as follows, and injected into the strings section:

cb_server=cbserver    cb_version=6.2.3.180809.1703    comms_ip=10.1.15.7    computer_name=win2012r2vendor    docs.0.alliance_data_attackframework=565652    docs.0.alliance_link_attackframework=https://attack.mitre.org/wiki/Technique/T1002    docs.0.alliance_score_attackframework=5    docs.0.alliance_updated_attackframework=2018-10-16T20:15:04.000Z    docs.0.childproc_count=2    docs.0.cmdline="Configure-SMRemoting.exe" -GET    docs.0.crossproc_count=3    docs.0.filemod_count=0    docs.0.host_type=server    docs.0.last_update=2018-11-05T03:46:47.76Z    docs.0.modload_count=46    docs.0.netconn_count=2    docs.0.os_type=windows    docs.0.parent_guid=00000001-0000-0bd8-01d4-69b9983550a6    docs.0.parent_name=servermanager.exe    docs.0.parent_pid=3032    docs.0.parent_segment_id=1    docs.0.parent_unique_id=00000001-0000-0bd8-01d4-69b9983550a6-000000000001    docs.0.path=c:\windows\system32\configure-smremoting.exe    docs.0.process_guid=00000001-0000-0d30-01d4-74ba2d77bd05    docs.0.process_md5=B2FA87E8F814BF08E1599B6B2FDC9720    docs.0.process_name=configure-smremoting.exe    docs.0.process_pid=3376    docs.0.regmod_count=0    docs.0.segment_id=1541390418888    docs.0.start=2018-11-05T03:46:47.614Z    docs.0.unique_id=00000001-0000-0d30-01d4-74ba2d77bd05-0166e20743c8    docs.0.username=WIN2012R2VENDOR\Administrator    docs.0.watchlist_249=2018-11-05T04:00:06.000449Z    feed_id=22    feed_name=attackframework    from_feed_search=false    group=default group    hostname=win2012r2vendor    interface_ip=10.1.15.7    ioc_query_index=events    ioc_query_string=(modload:crypt32.dll -process_name:mscorsvw.exe -process_name:logonui.exe -process_name:taskhost.exe -process_name:mobsync.exe -process_name:googleupdate.exe -process_name:upd.exe -process_name:audiodg.exe -process_name:wmiprvse.exe -process_name:chrome.exe -process_name:svchost.exe -process_name:backgroundtaskhost.exe -process_name:searchprotocolhost.exe)    ioc_type=query    ioc_value={"index_type": "events", "search_query": "cb.urlver=1&q=(modload%3Acrypt32.dll%20-process_name%3Amscorsvw.exe%20-process_name%3Alogonui.exe%20-process_name%3Ataskhost.exe%20-process_name%3Amobsync.exe%20-process_name%3Agoogleupdate.exe%20-process_name%3Aupd.exe%20-process_name%3Aaudiodg.exe%20-process_name%3Awmiprvse.exe%20-process_name%3Achrome.exe%20-process_name%3Asvchost.exe%20-process_name%3Abackgroundtaskhost.exe%20-process_name%3Asearchprotocolhost.exe)"}    process_guid=00000001-0000-0d30-01d4-74ba2d77bd05    process_id=00000001-0000-0d30-01d4-74ba2d77bd05    report_id=565652    report_score=5    segment_id=1    sensor_id=1    server_name=localhost    timestamp=1.541390418888e+09    type=feed.storage.hit.process