icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cybereason For Splunk
SHA256 checksum (cybereason-for-splunk_202.tgz) df3ac73f7efeb2ed96c7c0113e5d1a03bb733a5a483c58e173ac26016625cb09 SHA256 checksum (cybereason-for-splunk_201.tgz) 8408ce286139d8ce8efbc864f0f29c869e93da0168a46e02ac6b5df767be1ea9 SHA256 checksum (cybereason-for-splunk_200.tgz) 9a1763cfba7a75a93d06dc10383c3e5bc2160ec0270a0c847389a7fe25aa6b25 SHA256 checksum (cybereason-for-splunk_153.tgz) 617e520742eb4eb5634a1e59c46915467355e172a0653f1a0f3e2a752dc164ef SHA256 checksum (cybereason-for-splunk_152.tgz) 1600ef582f7a66e362afe923331d8655b7883a34633bbfb0a4c2be6dfda01843 SHA256 checksum (cybereason-for-splunk_151.tgz) e2f2bfb679d34e148635ac7055de4ddd339cd438770f9ef977dcb07ec895e57a SHA256 checksum (cybereason-for-splunk_150.tgz) f692e93379fb86886381de9687c46c2a7cd7724d0ae4a65453cd9cb8352db8d1 SHA256 checksum (cybereason-for-splunk_142.tgz) 6e9f484699183e394ce10f471192d1b4f63d8f8c8aee61286068f0d3f646c332 SHA256 checksum (cybereason-for-splunk_141.tgz) 02f7c9e0717a39c6e4a11742b647b6ddaa21f5b7076d36bb79a0141ea9a81a8a SHA256 checksum (cybereason-for-splunk_140.tgz) c38fa01651ca05976d61b6d022d8048c25507dcb24b61c37e70a231dcd785e94 SHA256 checksum (cybereason-for-splunk_130.tgz) 1a7d95a9e0fa97b7243b67c5409f79ed8953edd1b257ca666c7987d51b539b81 SHA256 checksum (cybereason-for-splunk_121.tgz) 58b2cbe1b905faf693950611cd18d9037276baf274ac06482c2e3fbe6e02ee6f SHA256 checksum (cybereason-for-splunk_120.tgz) 9919c393511a414736dada632d2110c4bb9bbff3de725842562157ee138e13b8 SHA256 checksum (cybereason-for-splunk_113.tgz) d4e4698f1b3a57f8311b2b626a82071820c150a1e453d2a8b13de0c74af6f11b SHA256 checksum (cybereason-for-splunk_112.tgz) b192666750c9c352b5c9bbcc724fe95c4df585e0e2871661b23b81871c86da60 SHA256 checksum (cybereason-for-splunk_111.tgz) ab0ea111d6ee77f38a399eafeb5170c0ad401a924ea43b73a369c6ef3b5e0150 SHA256 checksum (cybereason-for-splunk_106.tgz) bb37d867321c6ac0e839577766c8a928e257bfb46d7b3fe78cfbf78ae8569876 SHA256 checksum (cybereason-for-splunk_105.tgz) b205ad08f49347a7b279bce7c720c512a40952575dc5a2dc86527a54948e4e43
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Cybereason For Splunk

Splunk Cloud
Overview
Details
The Cybereason App for Splunk enables you to gain deep insight & visibility into your endpoints, detect advanced attacks based on AI hunting, and take response actions within Splunk. The Cybereason AI Hunting Engine automatically asks a complex set of questions of data collected from all of your endpoints at a rate of 8 million calculations per second, 24 hours a day, 7 days a week. This means the solution is continuously hunting on your behalf by asking the same sorts of questions advanced security analysts would ask as they hunt for threats inside an environment. The difference, however, is that the Cybereason malicious activity models run constantly, and continually adapt and evolve according to the data the solution receives and analyzes.

Learn More: https://cybereason-1.wistia.com/medias/hz40bq01nc

Welcome to Cybereason for Splunk App's documentation!

The Cybereason for Splunk App is fully supported by Cybereason. For any queries please visit https://nest.cybereason.com/
z

Overview

About Cybereason For Splunk

Author Metron Labs, Cybereason
App Version 2.0.2
App Build 184
Vendor Products Cybereason
Has index-time operations true, the included TA add-on must be placed on the indexers
Creates an index false
Implements summarization Currently, the app does not generate summaries

About Cybereason For Splunk

Version 2.0.2 of Cybereason For Splunk is compatible with:

Splunk Enterprise versions 8.2 or higher
Platforms Splunk Enterprise, Splunk Cloud

Compatability

The Cybereason App for Splunk enables you to gain deep insight & visibility into your endpoints, detect advanced attacks based on AI hunting, and take response actions within Splunk. The Cybereason AI Hunting Engine automatically asks a complex set of questions of data collected from all of your endpoints at a rate of 8 million calculations per second, 24 hours a day, 7 days a week. This means the solution is continuously hunting on your behalf by asking the same sorts of questions advanced security analysts would ask as they hunt for threats inside an environment. The difference, however, is that the Cybereason malicious activity models run constantly, and continually adapt and evolve according to the data the solution receives and analyzes.

When the Cybereason AI Hunting Engine identifies malicious behavior, its classified based on context and severity. Suspicions represent multiple pieces of anomalous behavior which are related and therefore more likely to be malicious. Malops (malicious operations) are a collection of related suspicious activities that are highly likely to indicate a security incident, and are defined in a way that minimizes the likelihood of analysts spending time investigating benign activities or false positives. Both Suspicions and Malops are presented in Splunk along with insights that give context to the alerts so you can quickly understand what is happening in your environment.

Scripts and binaries

This App provides the following scripts:

cybereason.py This python file controls the ability to interface with Cybereason.
cybereason_rest_client.py This Python class allows re-use of the cybereason api for various applications.
Diag.py Allows diag-targeted collection of information.
ModularInput.py Inheritable Class to create Modular Inputs
Utilities.py Allows utility interactions with Splunk Endpoints

Support and resources

Questions and answers

Access questions and answers specific to Cybereason For Splunk at https://answers.splunk.com . Be sure to tag your question with the App.

Support

Support is available via email at support@cybereason.com.

Installation and Configuration

Software requirements

Splunk Enterprise system requirements

Because this App runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.

Download

Download Cybereason For Splunk at https://splunkbase.splunk.com.

Installation steps

NOTE: Where referenced, the Cybereason Addon For Splunk is located on Splunkbase.

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Deploy as you would any App, and restart Splunk.

Deploy to Splunk Cloud

  1. Have your Splunk Cloud Support handle this installation. Do NOT install the Addon on the same system as the App.

  2. You may consider using an on-premise Heavy Forwarder to install Cybereason Addon For Splunk, and send the logs to Splunk Cloud.

Deploy to a Distributed Environment

  1. For each Search Head in the environment, deploy a non-configured copy of the App. DO NOT SEND Cybereason Addon For Splunk to a Search Head Cluster (SHC).

  2. For a single Data Collection Node OR Heavy Forwarder (a full instance of Splunk is required), install Cybereason Addon For Splunk and configure through the GUI.

User Guide

Configure Cybereason For Splunk

  • Install the App according to your environment (see steps above)

Indexes

By default all events will be written to the main index. You should change the index in the configuration files to match your specific index.

Troubleshoot Cybereason For Splunk

  1. Check the Monitoring Console (>=v6.5) for errors

  2. Visit the Application Health dashboard

  3. Check for errors using following queries:

    • index=_internal sourcetype=modularinput OR sourcetype=restclient log_level=ERROR
    • index=<yourindex> sourcetype=CybereasonForSplunk:error
  4. Execute $SPLUNK_HOME/bin/splunk diag --collect app:CybereasonForSplunk and send the diag to Cybereason Support.

Lookups

Cybereason For Splunk contains the following lookup files.

  • labels.csv - contains the labels for use with the Cybereason data

  • malop_types.csv - a lookup that helps drive panels

Third Party Notices

Version 2.0.2 of Cybereason For Splunk incorporates the following Third-party software or third-party services.

Metron Labs

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, eMA 02110-1301, USA.

defusedxml

defusedxml

PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2

1. This LICENSE AGREEMENT is between the Python Software Foundation (PSF), and the Individual or Organization (Licensee) accessing and otherwise using this software (Python) in source or binary form and its associated documentation.

2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python alone or in any derivative version, provided, however, that PSFs License Agreement and PSFs notice of copyright, i.e., Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 Python Software Foundation; All Rights Reserved are retained in Python alone or in any derivative version prepared by Licensee.

3. In the event Licensee prepares a derivative work that is based on or incorporates Python or any part thereof, and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python.

4. PSF is making Python available to Licensee on an AS IS basis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.

5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.

6. This License Agreement will automatically terminate upon a material breach of its terms and conditions.

7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture between PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party.

8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License Agreement.

markdown.js

Released under the MIT license.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

jquery.js

https://github.com/jquery/jquery/blob/master/LICENSE.txt

Copyright JS Foundation and other contributors, https://js.foundation/

This software consists of voluntary contributions made by many individuals. For exact contribution history, see the revision history available at https://github.com/jquery/jquery

The following license applies to all parts of this software except as documented below:


Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


All files located in the node_modules and external directories are externally maintained libraries used by this software which have their own licenses; we recommend you read them, as their terms may differ from the terms above.

d3.js

https://github.com/d3/d3/blob/master/LICENSE

Copyright 2010-2016 Mike Bostock All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  • Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

  • Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  • Neither the name of the author nor the names of contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Cybereason For Splunk

Navigation

Related Topics

2021, Metron Labs

Release Notes

Version 2.0.2
Jan. 30, 2023

Dashboard updated to display data for EPP Malops as well

Version 2.0.1
July 6, 2022

Minor bug fixes

Version 2.0.0
July 1, 2022

Removed App Configuration.

Version 1.5.3
March 31, 2022

Increased Malop Comments limit to 3000 characters.

Version 1.5.2
March 8, 2022

Added 'Add User' action logs

Version 1.5.1
Dec. 15, 2021

Version 1.5.1

  • Improvement
    • Changes related to Splunk Cloud compatibility
  • Bug
    • Resolved issue related to User action logs
Version 1.5.0
Sept. 20, 2021

Improvement
- Upgraded dashboards to version 1.1 so that they work with Splunk Cloud 8.2

Version 1.4.2
Aug. 27, 2021

Improvement
- Added suffix to child processes of Webshell malops for better identification
- Handled an exception while fetching server info for User agent
- Corrected the title of a panel in the Discovery board

Version 1.4.1
July 30, 2021

Improvement
- Better encryption facility for JWT authentication mode

Version 1.4.0
July 23, 2021

Improvement
- Comments are now included in the malop events
- New filters for User Action Logs for better querying
- Query enhancements for action logs
- Logging improvement for successful login
Documentation
- Added the steps to update credentials for an existing input

Version 1.3.0
June 8, 2021

Feature
- A new feature to turn off Logon Session data input from the user configuration settings
Improvement
- Better error handling for processing events
- Defined a new macro to query action logs in order to improve flexibility
Bug
- Resolved some issues related to User action logs
- Generating a new JWT token for authorization once the previous JWT has expired
- Removed a duplicate About tab from the app configuration page

Version 1.2.1
April 21, 2021

Improvement
- The api headers is updated to contain User-agent detail which will include the application version and server address
- The app now has the capability to log stacktrace if any exception occurs
- User action logs are downloaded in the log directory path and removed after they have been processed

Version 1.2.0
April 9, 2021

Enhancement
- Enabled the global field extraction for the app
- Added the action field for malop and malware events so that events get tagged correctly by the malware data model

Version 1.1.3
March 22, 2021

Bug
- Added a validation while fetching child processes for webshell typed malops

Version 1.1.2
March 3, 2021

Bug
- Minor event type change in the User audit log filter

Version 1.1.1
March 2, 2021

Improvement
- User action logs can now be configured using User Activity Input button which has a default interval of 24h as it has a significant footprint.

Version 1.0.6
Feb. 3, 2021

Enhancements
- User Activity Input button for polling users data with default interval time of 24 hours.
- All new dashboard to monitor action logs
- Severity values for Malop inbox table
- Option to authenticate using JWT token
- Removed troubleshooting logs to make the app space efficient
- Authentication data model to keep track of user log-ins once every 24h
- Webshell malop will now contain all of the child processes (and their children, and so on)

Bug
- Fixed duplicate malwares bug to make the app more memory efficient
- Resolved broken pipe error that obstructed the app's execution sometimes
- Added missing validations to improve application workflow

Version 1.0.5
Aug. 25, 2020

Updates for Splunk Cloud


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.