Security Logs Logstash Plugins Repository
Visit our Github page: https://github.com/empow/logstash-parsers
empow’s SIEM logstash pipeline is an open source repository containing logstash-based configuration pipelines for the digestion of logs generated by various products and vendors. The output is mapped to the Elastic Common Schema (ECS). In some cases, additional fields that have security value and do not exist in the ECS can be added.
In addition, some plugins can be used to enrich security logs with information about the attacker’s intent according to the cyber-kill-chain and MITRE ATT&CK representation language, using empow’s threat classification plugin.
What do you get?
Note: the plugins are based on log samples and vendors’ documentation. We are continuously updating and enriching the plugins. We encourage you to share examples and enhancements to improve the plugins and to keep them up-to-date with latest product versions. Please contact us at support@empow.co for and questions or updates.
To begin using the plugins repository, visit our Github page: https://github.com/empow/logstash-parsers
The empow classification plugin extends the functionality of logstash by classifying your log data, using the empow classification center, for attack intent and attack stage. Click here for more information on the benefits of using empow’s threat classification plugin.
To add empow’s intent threat classification to the output based on the setup described above, the following steps are required:
For any questions or clarifications please contact us at support@empow.co
If you’d like to register to the empow classification center, please fill out this form:
The empow classification plugin extends the functionality of logstash by classifying your log data, using the empow classification center, for attack intent and attack stage. Click here for more information on the benefits of using empow’s threat classification plugin.
To add empow’s intent threat classification to the output based on the setup described above, the following steps are required:
For any questions or clarifications please contact us at support@empow.co
Terms of Use
THESE TERMS OF USE (THE “TERMS”) ARE OFFERED TO YOU (AN INDIVIDUAL OR ENTITY OBTAINING THE SERVICE (AS DEFINED BELOW) (“YOU”) BY EMPOW CYBER SECURITY LTD., (“EMPOW”, “WE”, “US”). EACH OF THE ABOVE MAY INDIVIDUALLY BE REFERRED TO AS A “PARTY” AND JOINTLY AS THE “PARTIES”.
empow has developed a Classification Services , empow Logstsh Classification Filter Plugging, and empow ELK module, aiming to analyze security threats – and enrich – incoming security log with its security intent and attack stage. (“Service”). The Service is offered subject to these Terms.
PLEASE SCROLL DOWN AND CAREFULLY REVIEW ALL OF THE TERMS AND CONDITIONS CONTAINED IN THESE TERMS BEFORE USING THE SERVICE. BY REQUESTING TO SUBSCRIVBE TO THE FREE USE OF THE SERVICE, YOU ACKNOWLEDGE AND AGREE THAT YOU: (I) HAVE READ AND UNDERSTOOD ALL THE TERMS HEREIN; (II) ACCEPT AND AGREE TO BE LEGALLY BOUND BY THESE TERMS.
IF YOU DO NOT AGREE WITH THESE TERMS, DO NOT REQUEST TO SUBSCRIBE TO THE SERVICE AND DO NOT USE IT. IF YOU ARE USING THE SERVICE AND DO NOT AGREE WITH THESE TERMS, YOU MUST IMMEDIATELY DISCONTINUE SUCH USE AND COMPLY WITH THE TERMINATION PROVISIONS HEREOF.
IF YOU ARE ENTERING INTO THESE TERMS ON BEHALF OF A COMPANY (OR OTHER ENTITY), YOU REPRESENT THAT YOU ARE AN EMPLOYEE OR AGENT OF SUCH COMPANY (OR OTHER ENTITY) AND YOU HAVE THE AUTHORITY TO ENTER INTO THESE TERMS ON BEHALF OF SUCH COMPANY (OR OTHER ENTITY). IF YOU ARE A MINOR, YOU ARE REQUIRED TO OBTAIN A PARENTAL CONSENT FOR AND PRIOR TO USING THE SERVICE.
“Agents” is that portion of the Service offered as downloadable code, used to interact with other, cloud based, parts of the Service (for instance the Empow Logstsh Classification Filter Plugging).
“Documentation” means the user manuals, licenses text and related explanatory written materials concerning the Service that may be made available (with no obligation) to you by us.
“Software” is the proprietary software pertaining to the Service and Documentation with respect thereto as well as any updates, derivatives, modifications and/or enhancements that are made available by empow at its discretion. Without limiting the foregoing, the term “Software” includes the code underlying any Servers and Agents made available to and accessed by You pursuant to these Terms and expressly excludes “Third Party Software”.
“Third Party Software” means software that has not been developed by empow (including without limitation any third-party plug-in) and that is licensed under various licenses including open source programs.
empow reserves the right to change the terms of these terms including by changing fees for the service. such change in terms shall be made upon prior notice (via email where possible or through a notification on empow’s website) of at least 30 days.
Agent is provided under Apache v. 2.0 license unless otherwise agreed between the Parties (for the terms of the Apache v. 2.0 license please click here: https://www.apache.org/licenses/LICENSE-2.0).
once a security log is detected, and its relevant information is sent to the Service (e.g. malware hash value, IDS signature ID, etc.), the classification service, using algorithms such as machine learning technology, aims to automatically acquires textual description of the threat if necessary, analyzes the information and map the log into the relevant one or more security intent and attack stage. empow shall not reveal any logs or information sent to its system but can use insights on a specific threat to train its system and upgrade its Services.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL EMPOW, ITS AFFILIATES, THIRD PARTY LICENSORS OR SUPPLIERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, OR INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR THE INABILITY TO USE THE SERVICE (EVEN IF ADVISED OF THE POSSIBILITY OF THESE DAMAGES), OR FOR ANY CLAIM BY ANY OTHER PARTY.
You acknowledge that empow would not enter into these Terms without these limitations on its liability.
You also acknowledge that empow has no duty to update, supplement, support, maintain or otherwise modify the Service at any time and that the Service may not operate correctly and may provide wrong results.
Subject to applicable laws, by accepting these terms, you agree that Empow will send you offers that may interest you. Empow will only use the details you provide to communicate with you and to serve you with content that you subscribed for. Empow shall process your details as a controller of data, as described in the Privacy Policy posted on its website. You can always redraw your consent or delete or change your details from our mailing list by approaching us as described in the privacy policy or as detailed in the e-mails we send. If you want to use the services described hereunder but don’t want Empow to retain your data or use it, please email us.
Contact Information:
empow Cyber Security : 129 Newbury Street, 2nd floor, Boston, MA, US / info@empow.co © empow Cyber Security Inc. 2018. All rights reserved.