Spaces:
Sleeping
Sleeping
karimaloulou
commited on
Update descriptions.py
Browse files- descriptions.py +246 -425
descriptions.py
CHANGED
@@ -1,437 +1,258 @@
|
|
1 |
-
from format_input import
|
2 |
-
|
3 |
-
)
|
4 |
def detecting_types(chaine):
|
5 |
types = []
|
6 |
lignes = chaine.splitlines()
|
7 |
for l in lignes:
|
8 |
types.append(detect_log_type(l))
|
9 |
-
print
|
10 |
-
print
|
11 |
return types
|
12 |
|
13 |
-
|
14 |
-
|
15 |
for log_type in detecting_types(log_input):
|
16 |
if log_type == "sophos":
|
17 |
-
description += """
|
18 |
-
|
19 |
-
|
20 |
-
|
21 |
-
|
22 |
-
|
23 |
-
|
24 |
-
|
25 |
-
|
26 |
-
|
27 |
-
|
28 |
-
|
29 |
-
|
30 |
-
|
31 |
-
|
32 |
-
|
33 |
-
|
34 |
-
|
35 |
-
|
36 |
-
|
37 |
-
|
38 |
-
|
39 |
-
|
40 |
-
|
41 |
-
|
42 |
-
|
43 |
-
|
44 |
-
|
45 |
-
|
46 |
-
|
47 |
-
|
48 |
-
|
49 |
-
|
50 |
-
|
51 |
-
|
52 |
-
|
53 |
-
|
54 |
-
|
55 |
-
|
56 |
-
|
57 |
-
|
58 |
-
|
59 |
-
|
60 |
-
|
61 |
-
|
62 |
-
|
63 |
-
|
64 |
-
|
65 |
-
|
66 |
-
|
67 |
-
|
68 |
-
|
69 |
-
|
70 |
-
|
71 |
-
|
72 |
-
|
73 |
-
|
74 |
-
|
75 |
-
|
76 |
-
|
77 |
-
|
78 |
-
|
79 |
-
|
80 |
-
|
81 |
elif log_type == "azure-sign-in":
|
82 |
-
description += """
|
83 |
-
|
84 |
-
|
85 |
-
|
86 |
-
|
87 |
-
|
88 |
-
|
89 |
-
|
90 |
-
|
91 |
-
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
-
|
103 |
-
|
104 |
-
|
105 |
-
|
106 |
-
|
107 |
-
|
108 |
-
|
109 |
-
|
110 |
-
|
111 |
-
|
112 |
-
|
113 |
-
|
114 |
-
|
115 |
-
|
116 |
-
|
117 |
-
|
118 |
-
|
119 |
-
|
120 |
-
|
121 |
-
|
122 |
-
|
123 |
-
|
124 |
-
|
125 |
-
|
126 |
-
|
127 |
-
|
128 |
-
|
129 |
-
|
130 |
-
|
131 |
-
|
132 |
-
|
133 |
-
|
134 |
-
|
135 |
-
|
136 |
-
|
137 |
-
|
138 |
-
|
139 |
-
|
140 |
-
|
141 |
-
|
142 |
-
|
143 |
-
|
144 |
-
|
145 |
-
|
146 |
-
|
147 |
-
|
148 |
-
|
149 |
-
|
150 |
-
|
151 |
-
|
152 |
-
|
153 |
-
|
154 |
-
|
155 |
-
|
156 |
-
- Actor: Name of the actor performing the operation.
|
157 |
-
- initiatedBy: Details of the initiator (app or user).
|
158 |
-
|
159 |
-
Operation Information:
|
160 |
-
- Command: Description of the operation performed.
|
161 |
-
- operationType: Type of operation.
|
162 |
-
- result: Result of the activity.
|
163 |
-
- ResultStatus: Result status.
|
164 |
-
- resultReason: Cause of failure or timeout results.
|
165 |
-
|
166 |
-
Target Information:
|
167 |
-
- Target_DisplayName: Activity or operation name.
|
168 |
-
- Target_ObjectID: Unique identifier for the target object.
|
169 |
-
- Target_userPrincipalName: UPN of the target user.
|
170 |
-
- targetResources: Details about the target resources.
|
171 |
-
|
172 |
-
Additional Details:
|
173 |
-
- additionalDetails: Key-value pairs of additional details.
|
174 |
-
|
175 |
-
New and Old Values:
|
176 |
-
- newValue: Value after the operation.
|
177 |
-
- oldValue: Value before the operation.
|
178 |
-
- modified_values: Difference between new and old value.
|
179 |
-
|
180 |
-
Splunk-Specific Information:
|
181 |
-
- timeendpos: Byte position where the timestamp ends.
|
182 |
-
- timestartpos: Byte position where the timestamp starts.
|
183 |
-
- value: Logged value.
|
184 |
-
- _bkt: Bucket ID in Splunk.
|
185 |
-
- _cd: Splunk internal ID.
|
186 |
-
- _indextime: Epoch time when the log was indexed.
|
187 |
-
- _serial: Serial number for the log entry.
|
188 |
-
- _si: Splunk indexer information.
|
189 |
-
- _sourcetype: Splunk sourcetype.
|
190 |
-
- _subsecond: Subsecond part of the timestamp.
|
191 |
-
- _time: Time the log was generated."""
|
192 |
elif log_type == "palo-alto":
|
193 |
-
description += """
|
194 |
-
|
195 |
-
|
196 |
-
|
197 |
-
|
198 |
-
|
199 |
-
|
200 |
-
|
201 |
-
|
202 |
-
|
203 |
-
|
204 |
-
|
205 |
-
|
206 |
-
|
207 |
-
|
208 |
-
|
209 |
-
|
210 |
-
|
211 |
-
|
212 |
-
|
213 |
-
|
214 |
-
|
215 |
-
|
216 |
-
|
217 |
-
|
218 |
-
|
219 |
-
|
220 |
-
|
221 |
-
|
222 |
-
|
223 |
-
|
224 |
-
|
225 |
-
|
226 |
-
|
227 |
-
|
228 |
-
|
229 |
-
|
230 |
-
|
231 |
-
|
232 |
-
|
233 |
-
|
234 |
-
|
235 |
-
|
236 |
-
|
237 |
-
|
238 |
-
|
239 |
-
|
240 |
-
|
241 |
-
|
242 |
-
|
243 |
-
|
244 |
-
|
245 |
-
|
246 |
-
|
247 |
-
|
248 |
-
|
249 |
-
|
250 |
-
|
251 |
-
|
252 |
-
|
253 |
-
|
254 |
-
|
255 |
-
|
256 |
-
|
257 |
-
|
258 |
-
- Threat/Content Type: {Threat/Content Type}
|
259 |
-
- Generate Time: {Generate Time}
|
260 |
-
- Source Address: {Source Address}
|
261 |
-
- Destination Address: {Destination Address}
|
262 |
-
- NAT Source IP: {NAT Source IP}
|
263 |
-
- NAT Destination IP: {NAT Destination IP}
|
264 |
-
- Rule Name: {Rule Name}
|
265 |
-
- Source User: {Source User}
|
266 |
-
- Destination User: {Destination User}
|
267 |
-
- Application: {Application}
|
268 |
-
- Virtual System: {Virtual System}
|
269 |
-
- Source Zone: {Source Zone}
|
270 |
-
- Destination Zone: {Destination Zone}
|
271 |
-
- Inbound Interface: {Inbound Interface}
|
272 |
-
- Outbound Interface: {Outbound Interface}
|
273 |
-
- Log Action: {Log Action}
|
274 |
-
- Session ID: {Session ID}
|
275 |
-
- Repeat Count: {Repeat Count}
|
276 |
-
- Source Port: {Source Port}
|
277 |
-
- Destination Port: {Destination Port}
|
278 |
-
- NAT Source Port: {NAT Source Port}
|
279 |
-
- NAT Destination Port: {NAT Destination Port}
|
280 |
-
- Flags: {Flags}
|
281 |
-
- IP Protocol: {IP Protocol}
|
282 |
-
- Action: {Action}
|
283 |
-
- URL/Filename: {URL/Filename}
|
284 |
-
- Threat/Content Name: {Threat/Content Name}
|
285 |
-
- Category: {Category}
|
286 |
-
- Severity: {Severity}
|
287 |
-
- Direction: {Direction}
|
288 |
-
- Sequence Number: {Sequence Number}
|
289 |
-
- Action Flags: {Action Flags}
|
290 |
-
- Source Country: {Source Country}
|
291 |
-
- Destination Country: {Destination Country}
|
292 |
-
- Content Type: {Content Type}
|
293 |
-
- PCAP ID: {PCAP ID}
|
294 |
-
- File Digest: {File Digest}
|
295 |
-
- Cloud: {Cloud}
|
296 |
-
- URL Index: {URL Index}
|
297 |
-
- User Agent: {User Agent}
|
298 |
-
- File Type: {File Type}
|
299 |
-
- X-Forwarded-For: {X-Forwarded-For}
|
300 |
-
- Referer: {Referer}
|
301 |
-
- Sender: {Sender}
|
302 |
-
- Subject: {Subject}
|
303 |
-
- Recipient: {Recipient}
|
304 |
-
- Report ID: {Report ID}
|
305 |
-
- Device Group Hierarchy: {Device Group Hierarchy}
|
306 |
-
- Virtual System Name: {Virtual System Name}
|
307 |
-
- Device Name: {Device Name}
|
308 |
-
- Source VM UUID: {Source VM UUID}
|
309 |
-
- Destination VM UUID: {Destination VM UUID}
|
310 |
-
- HTTP Method: {HTTP Method}
|
311 |
-
- Tunnel ID/IMSI: {Tunnel ID/IMSI}
|
312 |
-
- Monitor Tag/IMEI: {Monitor Tag/IMEI}
|
313 |
-
- Parent Session ID: {Parent Session ID}
|
314 |
-
- Parent Session Start Time: {Parent Session Start Time}
|
315 |
-
- Tunnel Type: {Tunnel Type}
|
316 |
-
- Threat Category: {Threat Category}
|
317 |
-
- Content Version: {Content Version}
|
318 |
-
- SCTP Association ID: {SCTP Association ID}
|
319 |
-
- Payload Protocol ID: {Payload Protocol ID}
|
320 |
-
- HTTP Headers: {HTTP Headers}
|
321 |
-
- URL Category List: {URL Category List}
|
322 |
-
- Rule UUID: {Rule UUID}
|
323 |
-
- HTTP/2 Connection: {HTTP/2 Connection}
|
324 |
-
- Dynamic User Group Name: {Dynamic User Group Name}
|
325 |
-
- XFF Address: {XFF Address}
|
326 |
-
- Source Device Category: {Source Device Category}
|
327 |
-
- Source Device Profile: {Source Device Profile}
|
328 |
-
- Source Device Model: {Source Device Model}
|
329 |
-
- Source Device Vendor: {Source Device Vendor}
|
330 |
-
- Source Device OS Family: {Source Device OS Family}
|
331 |
-
- Source Device OS Version: {Source Device OS Version}
|
332 |
-
- Source Hostname: {Source Hostname}
|
333 |
-
- Source MAC Address: {Source MAC Address}
|
334 |
-
- Destination Device Category: {Destination Device Category}
|
335 |
-
- Destination Device Profile: {Destination Device Profile}
|
336 |
-
"""
|
337 |
-
|
338 |
elif log_type == "office365":
|
339 |
-
description += """
|
340 |
-
|
341 |
-
|
342 |
-
|
343 |
-
|
344 |
-
|
345 |
-
|
346 |
-
|
347 |
-
|
348 |
-
|
349 |
-
|
350 |
-
|
351 |
-
|
352 |
-
|
353 |
-
|
354 |
-
|
355 |
-
|
356 |
-
|
357 |
-
|
358 |
-
|
359 |
-
|
360 |
-
|
361 |
-
|
362 |
-
|
363 |
-
|
364 |
-
|
365 |
-
|
366 |
-
|
367 |
-
|
368 |
-
|
369 |
-
|
370 |
-
|
371 |
-
|
372 |
-
|
373 |
-
|
374 |
-
|
375 |
-
|
376 |
-
|
377 |
-
ResourceTenantId: The tenant ID associated with the resource being accessed or modified.
|
378 |
-
|
379 |
-
UserId: The unique identifier of the user involved in the event.
|
380 |
-
|
381 |
-
UserKey: A key associated with the user, often used for authentication or identification.
|
382 |
-
|
383 |
-
UserType: The type of user (e.g., member, guest).
|
384 |
-
|
385 |
-
Version: The version of the log schema or format.
|
386 |
-
|
387 |
-
Workload: The specific Microsoft service or workload related to the event (e.g., Teams, Exchange).
|
388 |
-
|
389 |
-
App: The application involved in the event.
|
390 |
-
|
391 |
-
Authentication_service: The authentication service used for the event.
|
392 |
-
|
393 |
-
Command: The specific command executed as part of the event.
|
394 |
-
|
395 |
-
Dest: The destination involved in the event.
|
396 |
-
|
397 |
-
Dest_name: The name of the destination.
|
398 |
-
|
399 |
-
Dvc: Device information related to the event.
|
400 |
-
|
401 |
-
Host: The host or server where the event occurred.
|
402 |
-
|
403 |
-
Record_type: Another field indicating the type of record.
|
404 |
-
|
405 |
-
Result: The outcome or result of the operation (e.g., success, failure).
|
406 |
-
|
407 |
-
Signature: A signature related to the event, often for verification purposes.
|
408 |
-
|
409 |
-
Status: The status of the event or operation (e.g., completed, pending).
|
410 |
-
|
411 |
-
Tenant_id: The unique identifier of the tenant where the event occurred.
|
412 |
-
|
413 |
-
Timeendpos: The end time position of the event.
|
414 |
-
|
415 |
-
Timestartpos: The start time position of the event.
|
416 |
-
|
417 |
-
User: General information about the user involved in the event.
|
418 |
-
|
419 |
-
User_id: The unique identifier of the user.
|
420 |
-
|
421 |
-
User_type: The type of user (similar to UserType).
|
422 |
-
|
423 |
-
Vendor_account: The account associated with the vendor.
|
424 |
-
|
425 |
-
Vendor_product: The product associated with the vendor.
|
426 |
-
|
427 |
-
_bkt: The bucket where the log data is stored.
|
428 |
-
|
429 |
-
_cd: The cluster ID in a distributed system.
|
430 |
-
|
431 |
-
_indextime: The time when the log entry was indexed.
|
432 |
-
|
433 |
-
_serial: A serial number or sequence identifier for the log entry.
|
434 |
-
|
435 |
-
_si: An array containing additional internal identifiers."""
|
436 |
-
|
437 |
-
return list(set(description))
|
|
|
1 |
+
from format_input import detect_log_type
|
2 |
+
|
|
|
3 |
def detecting_types(chaine):
|
4 |
types = []
|
5 |
lignes = chaine.splitlines()
|
6 |
for l in lignes:
|
7 |
types.append(detect_log_type(l))
|
8 |
+
print('available types!')
|
9 |
+
print('TYPES!!! ', types)
|
10 |
return types
|
11 |
|
12 |
+
def descriptions(log_input):
|
13 |
+
description = ""
|
14 |
for log_type in detecting_types(log_input):
|
15 |
if log_type == "sophos":
|
16 |
+
description += """\n
|
17 |
+
- sourcetype: The type of source that generated the log entry.
|
18 |
+
- _raw: The raw log message as received.
|
19 |
+
- action: The action taken by the firewall.
|
20 |
+
- app: The application associated with the session.
|
21 |
+
- app_category: Category of the application.
|
22 |
+
- app_is_cloud: Indicates if the application is cloud-based.
|
23 |
+
- app_name: Name of the application.
|
24 |
+
- app_resolved_by: Method by which the application was identified.
|
25 |
+
- app_risk: Risk level of the application.
|
26 |
+
- app_technology: Technology type of the application.
|
27 |
+
- bytes: Total number of bytes transferred.
|
28 |
+
- bytes_in: Number of bytes received.
|
29 |
+
- bytes_out: Number of bytes sent.
|
30 |
+
- con_id: Connection ID.
|
31 |
+
- dest: Destination IP address.
|
32 |
+
- dest_mac: Destination MAC address.
|
33 |
+
- dest_port: Destination port.
|
34 |
+
- dest_zone: Destination zone.
|
35 |
+
- device_model: Model of the device.
|
36 |
+
- device_name: Name of the device.
|
37 |
+
- device_serial_id: Serial ID of the device.
|
38 |
+
- dst_country: Destination country.
|
39 |
+
- duration: Duration of the session.
|
40 |
+
- dvc: Device name.
|
41 |
+
- ether_type: Ethernet type.
|
42 |
+
- fw_rule_id: Firewall rule ID.
|
43 |
+
- fw_rule_type: Type of firewall rule.
|
44 |
+
- hb_status: Heartbeat status.
|
45 |
+
- host: Host IP address.
|
46 |
+
- in_display_interface: Display interface name.
|
47 |
+
- in_interface: Ingress interface.
|
48 |
+
- log_component: Log component.
|
49 |
+
- log_id: Log ID.
|
50 |
+
- log_occurrence: Number of occurrences of the log entry.
|
51 |
+
- log_subtype: Subtype of the log.
|
52 |
+
- log_type: Type of log.
|
53 |
+
- log_version: Version of the log format.
|
54 |
+
- nat_rule_id: NAT rule ID.
|
55 |
+
- packets: Total number of packets transferred.
|
56 |
+
- packets_in: Number of packets received.
|
57 |
+
- packets_out: Number of packets sent.
|
58 |
+
- protocol: Protocol used in the session.
|
59 |
+
- qualifier: Qualifier for the log entry.
|
60 |
+
- severity: Severity level of the event.
|
61 |
+
- src: Source IP address.
|
62 |
+
- src_country: Source country.
|
63 |
+
- src_interface: Source interface.
|
64 |
+
- src_mac: Source MAC address.
|
65 |
+
- src_port: Source port.
|
66 |
+
- src_zone: Source zone.
|
67 |
+
- timeendpos: End position of the timestamp in the raw log.
|
68 |
+
- timestamp: Timestamp of the event.
|
69 |
+
- timestartpos: Start position of the timestamp in the raw log.
|
70 |
+
- transport: Transport protocol used.
|
71 |
+
- _bkt: Bucket name where the event is stored in Splunk.
|
72 |
+
- _cd: Composite ID of the event.
|
73 |
+
- _indextime: Epoch time when the event was indexed.
|
74 |
+
- _kv: Key-value extraction indicator.
|
75 |
+
- _serial: Sequence number of the event.
|
76 |
+
- _si: Splunk indexer and index information.
|
77 |
+
- _sourcetype: Source type of the event data.
|
78 |
+
- _time: Timestamp when the event occurred.
|
79 |
+
"""
|
80 |
elif log_type == "azure-sign-in":
|
81 |
+
description += """\n
|
82 |
+
- Source Type: Type or category of the log.
|
83 |
+
- appDisplayName: The application name displayed in the Azure Portal.
|
84 |
+
- appId: The application identifier in Azure Active Directory.
|
85 |
+
- clientAppUsed: The legacy client used for sign-in activity.
|
86 |
+
- conditionalAccessStatus: The status of the conditional access policy triggered.
|
87 |
+
- correlationId: The identifier sent from the client when sign-in is initiated.
|
88 |
+
- createdDateTime: The date and time the sign-in was initiated in UTC.
|
89 |
+
- deviceDetail.browser: Browser details.
|
90 |
+
- deviceDetail.deviceId: Device ID.
|
91 |
+
- deviceDetail.displayName: Device display name.
|
92 |
+
- deviceDetail.isCompliant: Compliance status.
|
93 |
+
- deviceDetail.isManaged: Managed status.
|
94 |
+
- deviceDetail.operatingSystem: Operating system details.
|
95 |
+
- deviceDetail.trustType: Trust type.
|
96 |
+
- host: Tenant identifier.
|
97 |
+
- id: Sign-in activity identifier.
|
98 |
+
- ipAddress: Client IP address.
|
99 |
+
- isInteractive: Indicates whether a sign-in is interactive.
|
100 |
+
- location.city: City.
|
101 |
+
- location.countryOrRegion: Country or region.
|
102 |
+
- location.geoCoordinates.altitude: Altitude.
|
103 |
+
- location.geoCoordinates.latitude: Latitude.
|
104 |
+
- location.geoCoordinates.longitude: Longitude.
|
105 |
+
- location.state: State.
|
106 |
+
- resourceDisplayName: Resource display name.
|
107 |
+
- resourceId: Resource identifier.
|
108 |
+
- riskDetail: Reason behind the risk state.
|
109 |
+
- riskLevelAggregated: Aggregated risk level.
|
110 |
+
- riskLevelDuringSignIn: Risk level during sign-in.
|
111 |
+
- riskState: Risk state.
|
112 |
+
- status.additionalDetails: Additional status details.
|
113 |
+
- status.errorCode: Error code.
|
114 |
+
- status.failureReason: Failure reason.
|
115 |
+
- userDisplayName: User display name.
|
116 |
+
- userId: User identifier.
|
117 |
+
- userPrincipalName: User principal name.
|
118 |
+
- timestartpos: Byte position where the timestamp starts.
|
119 |
+
- timeendpos: Byte position where the timestamp ends.
|
120 |
+
- sourcetype: Audit
|
121 |
+
- host: Host name.
|
122 |
+
- id: Unique activity identifier.
|
123 |
+
- category: Category value.
|
124 |
+
- loggedByService: Service that logged the event.
|
125 |
+
- activityDateTime: Date and time the activity occurred.
|
126 |
+
- activityDisplayName: Human-readable name for the activity.
|
127 |
+
- Level: Message type.
|
128 |
+
- Actor: Name of the actor performing the operation.
|
129 |
+
- initiatedBy: Details of the initiator (app or user).
|
130 |
+
- Command: Description of the operation performed.
|
131 |
+
- operationType: Type of operation.
|
132 |
+
- result: Result of the activity.
|
133 |
+
- ResultStatus: Result status.
|
134 |
+
- resultReason: Cause of failure or timeout results.
|
135 |
+
- Target_DisplayName: Activity or operation name.
|
136 |
+
- Target_ObjectID: Unique identifier for the target object.
|
137 |
+
- Target_userPrincipalName: UPN of the target user.
|
138 |
+
- targetResources: Details about the target resources.
|
139 |
+
- additionalDetails: Key-value pairs of additional details.
|
140 |
+
- newValue: Value after the operation.
|
141 |
+
- oldValue: Value before the operation.
|
142 |
+
- modified_values: Difference between new and old value.
|
143 |
+
- timeendpos: Byte position where the timestamp ends.
|
144 |
+
- timestartpos: Byte position where the timestamp starts.
|
145 |
+
- value: Logged value.
|
146 |
+
- _bkt: Bucket ID in Splunk.
|
147 |
+
- _cd: Splunk internal ID.
|
148 |
+
- _indextime: Epoch time when the log was indexed.
|
149 |
+
- _serial: Serial number for the log entry.
|
150 |
+
- _si: Splunk indexer information.
|
151 |
+
- _sourcetype: Splunk sourcetype.
|
152 |
+
- _subsecond: Subsecond part of the timestamp.
|
153 |
+
- _time: Time the log was generated.
|
154 |
+
"""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
155 |
elif log_type == "palo-alto":
|
156 |
+
description += """\n
|
157 |
+
- Receive Time: {Receive Time}
|
158 |
+
- Serial Number: {Serial Number}
|
159 |
+
- Type: SYSTEM
|
160 |
+
- Subtype: {Subtype}
|
161 |
+
- Generated Time: {Generated Time}
|
162 |
+
- Virtual System: {Virtual System}
|
163 |
+
- Event ID: {Event ID}
|
164 |
+
- Module: {Module} (only if Subtype is general)
|
165 |
+
- Severity: {Severity}
|
166 |
+
- Description: {Description}
|
167 |
+
- Sequence Number: {Sequence Number}
|
168 |
+
- Action Flags: {Action Flags}
|
169 |
+
- Device Group Hierarchy Levels: {Device Group Hierarchy Levels}
|
170 |
+
- Virtual System Name: {Virtual System Name}
|
171 |
+
- Device Name: {Device Name}
|
172 |
+
- Receive Time: {Receive Time}
|
173 |
+
- Serial Number: {Serial Number}
|
174 |
+
- Type: USERID
|
175 |
+
- Subtype: {Subtype} (login, logout, register-tag, unregister-tag)
|
176 |
+
- Generated Time: {Generated Time}
|
177 |
+
- Virtual System: {Virtual System}
|
178 |
+
- Command: {Command}
|
179 |
+
- User: {User}
|
180 |
+
- Source IP: {Source IP}
|
181 |
+
- Data Source Name: {Data Source Name}
|
182 |
+
- Event ID: {Event ID}
|
183 |
+
- Repeat Count: {Repeat Count}
|
184 |
+
- Timeout: {Timeout}
|
185 |
+
- Source Port: {Source Port}
|
186 |
+
- Destination Port: {Destination Port}
|
187 |
+
- Sequence Number: {Sequence Number}
|
188 |
+
- Action Flags: {Action Flags}
|
189 |
+
- Device Group Hierarchy Levels: {Device Group Hierarchy Levels}
|
190 |
+
- Virtual System Name: {Virtual System Name}
|
191 |
+
- Device Name: {Device Name}
|
192 |
+
- Virtual System ID: {Virtual System ID}
|
193 |
+
- Rule Name: {Rule Name}
|
194 |
+
- Source Zone: {Source Zone}
|
195 |
+
- Destination Zone: {Destination Zone}
|
196 |
+
- Source IP: {Source IP}
|
197 |
+
- Destination IP: {Destination IP}
|
198 |
+
- User: {User}
|
199 |
+
- Application: {Application}
|
200 |
+
- Virtual System: {Virtual System}
|
201 |
+
- Source Port: {Source Port}
|
202 |
+
- Destination Port: {Destination Port}
|
203 |
+
- Inbound Interface: {Inbound Interface}
|
204 |
+
- Outbound Interface: {Outbound Interface}
|
205 |
+
- Log Action: {Log Action}
|
206 |
+
- IP Protocol: {IP Protocol}
|
207 |
+
- Action: {Action}
|
208 |
+
- Rule Type: {Rule Type}
|
209 |
+
- Sequence Number: {Sequence Number}
|
210 |
+
- Repeat Count: {Repeat Count}
|
211 |
+
- Source Country: {Source Country}
|
212 |
+
- Destination Country: {Destination Country}
|
213 |
+
- NAT Source IP: {NAT Source IP}
|
214 |
+
- NAT Destination IP: {NAT Destination IP}
|
215 |
+
- NAT Source Port: {NAT Source Port}
|
216 |
+
- NAT Destination Port: {NAT Destination Port}
|
217 |
+
- Device Group Hierarchy Levels: {Device Group Hierarchy Levels}
|
218 |
+
- Virtual System Name: {Virtual System Name}
|
219 |
+
- Device Name: {Device Name}
|
220 |
+
"""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
221 |
elif log_type == "office365":
|
222 |
+
description += """\n
|
223 |
+
- CreationTime: The time the log was created.
|
224 |
+
- UserId: The ID of the user who performed the activity.
|
225 |
+
- Operation: The type of operation performed.
|
226 |
+
- Workload: The Office 365 service where the event occurred.
|
227 |
+
- ClientIP: The IP address of the device used.
|
228 |
+
- UserAgent: Information about the user's client or device.
|
229 |
+
- ResultStatus: The result status of the operation.
|
230 |
+
- LogonType: The type of logon used.
|
231 |
+
- Target: The target object that was accessed.
|
232 |
+
- Actor: The user who initiated the action.
|
233 |
+
- Action: The action performed.
|
234 |
+
- ItemName: The name of the item accessed.
|
235 |
+
- Source: The source of the log entry.
|
236 |
+
- Site: The site where the event occurred.
|
237 |
+
- WebId: The web ID where the event occurred.
|
238 |
+
- ListId: The list ID where the event occurred.
|
239 |
+
- CorrelationId: The correlation ID for troubleshooting.
|
240 |
+
- GroupId: The group ID associated with the event.
|
241 |
+
- SiteId: The site ID associated with the event.
|
242 |
+
- FileData: Metadata about the file involved.
|
243 |
+
- SiteUrl: The URL of the site where the event occurred.
|
244 |
+
- UserId: The ID of the user who performed the activity.
|
245 |
+
- UserType: The type of user (e.g., guest, member).
|
246 |
+
- SourceFileExtension: The file extension of the source file.
|
247 |
+
- SourceFileName: The name of the source file.
|
248 |
+
- UniqueFileId: The unique ID of the file.
|
249 |
+
- Timestamp: The time the event occurred.
|
250 |
+
- _bkt: The bucket ID for the event.
|
251 |
+
- _cd: The Splunk ID for the event.
|
252 |
+
- _indextime: The epoch time when the event was indexed.
|
253 |
+
- _serial: The serial number for the event.
|
254 |
+
- _si: The Splunk indexer information.
|
255 |
+
- _sourcetype: The source type of the event.
|
256 |
+
- _time: The time the event occurred.
|
257 |
+
"""
|
258 |
+
return description.strip()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|