2018-12-31 12:33 PM
We are trying to import logs from FireEye Central Management System (CMS). One of the logging formats for FE CM is Common Event Format (CEF). Has anybody configured custom cef parsing for this device?
When I enabled CEF logging on CMS the device.type came is as ciscorouter even when I configure a parser mapping for the device to the cef parser. I've read the article on configuration of cef-custom.xml but any push in the right direction would help.
/Dion
2019-01-01 12:33 AM
Have you enabled the CEF parser on the Log Decoder?
What other log formats are supported?
Is LEEF one of them?
2019-01-02 08:37 AM
The cef log parser is enabled. The CMS supports CEF, LEEF, CSV, TEXT, JSON, XML. I assumed that with the CEF parser and the cef-custom.xml it would be easiest to get CEF working the way I want. When I use LEEF, the messages are parsed as fireeyewebmps. But this doesn’t parse cleanly. We have several of the FireEye products and would like to implement support for all of them.
2019-01-02 10:12 AM
Dion
Would you contact me directly to discuss a an idea that I have for you?
dave dot glover at rsa dot com
Thanks
Dave
2019-01-26 09:10 AM
Dave,
Thanks for your help. The CEF logs from the CMS seem to be lacking the timestamp and other information in the header so they are not being identified correctly as CEF. You helped me get started with a version of a parser for LEEF formatted logs.
I'm including my modifications. I'm not really a parser writer, so I'm sure it could use some work.
============
<?xml version="1.0" encoding="UTF-8"?>
<DEVICEMESSAGES
name="fireeyecms"
displayname="FireEye CMS"
group="Intrusion"
type="7104">
<VERSION
xml="1"
revision="1"
device="2.0"/>
<TAGVALMAP
pairdelimiter="^"
valuedelimiter="="/>
<HEADER
id1="HDR1"
id2="HDR1"
messageid="STRCAT('CMS-MSG')"
content="fenotify-<hfld1>.alert: LEEF:1.0|<hfld2>|<obj_type>|<content_version>|<detail>|<!payload>"/>
<MESSAGE
id1="CMS-MSG"
id2="CMS-MSG"
tagval="true"
missField="true"
content="devTime=<event_time_string>^devTimeFormat=<time_format>^sev=<severity>^proto=<protocol>^src=<saddr>^dst=<daddr>^cncHost=<daddr>^srcPort=<sport>^shost=<shost>^dstPort=<dport>^srcMAC=<smacaddr>^request=<url>^dstMAC=<dmacaddr>^url=<url>^link=<url>^vlan=<vlan>^externalId=<ext_id>^dvchost=<device.host>^cncPort=<dport>^sigId=<sigid>^cat=<event_type>^signame=<signame>^action=<action>^sname=<category>^filePath=<filename>^sha256sum=<checksum>^duser=<email.dst>^subject=<subject>^suser=<email.src>^msg<msg>^dvc=<fld1>^uuid=<uuid>^fileHash=<checksum>^cncChannel=<webpage>^osinfo=<os>"/>
</DEVICEMESSAGES>