This section describes the binary watchlist hit.
Binary Watchlist – Example
Mar 13 03:50:19 [1037] <warning> reason=watchlist.hit type=module md5=7931ADC31F0180855E05D6666630B3A3 host=WORKSTATION-2' sha256=F6F9A4834AFE57EBC0B77CF1E83F0C24B298C2FCBBF214CF6CC4DBD24E8BFB4B sensor_id=74 watchlist_id=8 watchlist_name='Newly Loaded Modules' timestamp='1426233008.59' first_seen='2014-11-13T07:47:17.862Z' group=['Default Group'] desc='AntiMalware Definition Update' company_name='Microsoft Corporation' product_name='Microsoft Malware Protection' product_version='1.193.2512.0' file_version='1.193.2512.0' signed='Signed'Binary Watchlist – Default Template
reason=watchlist.hit type=module md5={{doc["md5"]}} sha256={{doc["sha256"]}} host=’{{doc.get(’hostname’)}}’ sensor_id={{doc.get(’sensor_id’)}} watchlist_id={{doc[’watchlist_id’]}} watchlist_name=’{{doc[’watchlist_name’]}}’ timestamp=’{{doc[’event_timestamp’]}}’ first_seen=’{{doc["server_added_timestamp"]}}’ group={{doc["group"]}} desc=’{{doc["file_desc"]}}’ company_name=’{{doc["company_name"]}}’ product_name=’{{doc["product_name"]}}’ product_version=’{{doc["product_version"]}}’ file_version=’{{doc["file_version"]}}’ signed=’{{doc["signed"]}}’ {% for k in doc %}{% ifk.startswith("alliance_") %} {{k}}=’{{doc[k]}}’{% endif %}{% endfor %}Binary Watchlist – Key-Value Pairs
Syslog Label |
Solr Doc Reference |
Description |
---|---|---|
reason |
No doc reference |
Text that describes the entry. The reason label is hard-coded in the syslog template and identifies the type of the event as "watchlist.hit," "feed.hit," or "binaryinfo." |
type |
No doc reference |
Text that identifies the type of data that is returned with the event. For binary modules, the value is module . |
md5 |
md5 |
MD5 hash value of a process, a parent process, a child process, a loaded module or a written file. |
sha256 |
sha256 |
SHA-256 hash value of a process, a parent process, a child process, a loaded module or a written file. |
host |
hostname |
Hostname of the computer on which the binary was observed. |
sensor_id |
sensor_id |
Sensor ID of the computer on which the binary was observed. |
watchlist_id |
watchlist_id |
The ID of the watchlist that matched the hit criteria (-1 is the internal syslog test). |
watchlist_name |
watchlist_name |
Name of the watchlist that matched the hit criteria. |
timestamp |
event_timestamp |
Epoch time of the watchlist hit event. |
first_seen |
server_added_ timestamp |
Time that this binary was first seen by the Carbon Black EDR server. |
group |
group |
First sensor group in which this binary was observed. |
desc |
file_desc |
File description string from the class FileVersionInfo. |
company_name |
company_name |
Company name string from the class FileVersionInfo. |
product_name |
product_name |
Product name string from the class FileVersionInfo. |
product_version |
product_version |
Product version string from the class FileVersionInfo. |
file_version |
file_version |
File version string from the class FileVersionInfo. |
signed |
signed |
Digital signature status of the binary. |
for/if loops |
_* ioc_attr |
Note:
for/if loops are not required. Their purpose is to report attributes that do not have predefined sets. You can create customized templates that do not contain them if you do not need to report on |