This section describes the process storage feed hit.

Process Storage Feed Hit – Example

Aug 12 14:26:10 [26070] <warning> reason=feed.storage.hit type=event process_guid=00000001-0000-de04-01cf-b65a8ecb26cf segment_id=1488563344023 host=’SERV12R2X64-01’ sensor_id=1 feed_id=10 feed_name=’tor’ ioc_type=’ipv4’ ioc_value=’38.229.70.52’ direction=’Outbound’ protocol=’TCP’ port=’22’ timestamp=’1407867970.49’ start_time=’2014-08-12T18:23:47.602Z’ group=’Default Group’ process_md5=’a3ccfd0aa0b17fd23aa9fd0d84b86c05’
process_sha256=’7AFB56DD48565C3C9804F683C80EF47E5333F847F2D3211EC11ED13AD36061E1’ 
process_name=’putty.exe’ process_path=’c:\users\ssmith\desktop\putty.exe’ last_update=’2014-08-12T18:23:55.415Z’ alliance_link_tor=’http://www.torproject.org’ alliance_score_tor=’0’ alliance_updated_tor=’2014-05-06T17:15:23.000Z’ alliance_data_tor=’TOR-Node-38.229.70.52’
Process Storage Feed Hit – Default Template
reason=feed.storage.hit type=event
process_guid={{doc['process_id']}
segment_id={{doc['segment_id']}}
host='{{doc['hostname']}}'
comms_ip='{{doc['comms_ip']}}'
interface_ip='{{doc['interface_ip']}}'
sensor_id={{doc['sensor_id']}}
feed_id={{doc['feed_id']}}
feed_name='{{doc['feed_name']}}'
ioc_type='{{doc['ioc_type']}}'
ioc_value='{{doc['ioc_value']}}'
{% for k in doc['ioc_attr'] %}
{{k}}='{{doc['ioc_attr'][k]}}'{% endfor %}
timestamp='{{doc['event_timestamp']}}'
start_time='{{doc['start']}}'
group='{{doc['group']}}'
process_md5='{{doc['process_md5']}}'
process_sha256=’{{doc['process_sha256']}}'
process_name='{{doc['process_name']}}'
process_path='{{doc['path']}}'
last_update='{{doc['last_update']}}'
{% for k in doc %}{% if k.startswith("alliance_") %}
{{k}}='{{doc[k]}}'{% endif %}{% endfor %}
Process Storage Feed Hit – Key-Value Pairs

Syslog Label

Solr Doc Reference

Description

reason

no doc reference

Text that describes the entry. The reason label is hard-coded in the syslog template and identifies the type of the event as "watchlist.hit," "feed.hit," or "binaryinfo."

type

no doc reference

Text that identifies the type of data that is returned with the event. For process events, the value is ‘event’.

process_guid

process_id

Process doc identifier.

segment_id

segment_id

Process doc segment identifier.

host

hostname

Hostname of the computer on which the feed hit was detected.

comms_ip

comms_ip

IP address from which Carbon Black EDR received the event (which could be a NAT or proxy address, if one is configured for the computer on which the process executed; otherwise this is the same as interface_ip).

interface_ip

Interface_ip

IP address of the computer on which the process executed.

sensor_id

sensor_id

Sensor ID of endpoint that observed the feed hit.

feed_id

feed_id

ID of the feed that was matched.

feed_name

feed_name

Name of the feed that was matched.

report_title

report_title

Name of the item in the feed that was matched.

ioc_type

ioc_type

Type of the IOC that caused the hit.

ioc_value

ioc_value

Value of the IOC that matched.

for/if loops

_* ioc_attr

  • alliance_* identifies and prints all attributes whose names start with "alliance_" in all documents that contain feed hits, including documents reported by watchlist hits. These attributes represent feed hits.

  • ioc_attr identifies and prints additional attributes on IOC values that were matched.

Note:

for/if loops are not required. They report attributes that do not have predefined sets. You can create customized templates that do not contain them if you do not need to report on alliance_* or ioc_attr attributes.

timestamp

event_timestamp

Epoch time of the feed hit event.

start_time

start

Start time of this process, in the computer’s local time.

group

group

Sensor group to which the sensor was assigned at the time of process execution.

process_md5

process_md5

MD5 hash value of the executable backing this process.

process_sha256

process_sha256

SHA-256 hash value of the executable backing this process.

process_name

process_name

Filename of the executable backing this process.

process_path

path

Full path to the executable backing this process.

last_update

last_update

Last activity in this process, in the computer’s local time.