Hi Fredik,

Long time no see!. It is a hot summer here and, as always, playing with 
OSSEC ;).

I don't have time to create all the decoders, but here a template to help 
you:
<decoder name="checkpoint">
  <prematch>^redirect \p|^prevent \p|^allow \p|^block \p|^mail System 
Alert|\S+ alert Protection Name:</prematch>
  <type>firewall</type>
</decoder>


<!--
BLOCK
Jun  2 13:24:13 st4600fw01n1 block <eth6 mail src: 192.168.71.151; dst: 
54.164.78.72; proto: tcp; bytes: 1845; sent_bytes: 749; received_bytes: 
1096; app_id: 1347922162; browse_time: ******; Suppressed logs: 7; 
Referrer_self_uid: ******; Referrer_Parent_uid: ******; product: URL 
Filtering; service: http; s_port: 51096; product_family: Network;
-->
<decoder name="checkpoint-block">
  <parent>checkpoint</parent>
  <prematch>^block \p</prematch>
  <regex offset="after_prematch">src: (\S+); dst: (\S+); proto: (\S+);
</regex>
  <order>srcip,dstip,protocol</order>
</decoder>


<!--
ALLOW
...
-->


<!--
ALERT
May 31 08:05:18 > st4600fw01n1 alert Protection Name: TCP Urgent Data 
Enforcement; Severity: 0; Confidence Level: 0; protection_id: 
tcp_block_urg_bit_enable; SmartDefense Profile: Recommended_Protection; 
Performance Impact: 0; Protection Type: settings; Attack Info: TCP segment 
with urgent pointer (no data). Urgent data indication was stripped. Please 
refer to sk36869.; attack: Streaming Engine: TCP Urgent Data Enforcement; 
Total logs: 8; Suppressed logs: 7; proto: tcp; dst: 52.22.193.162; src: 
192.168.10.204; product: SmartDefense; service: http; s_port: 50869; 
FollowUp: Not Followed; product_family: Network;
-->
<decoder name="checkpoint-alert">
  <parent>checkpoint</parent>
  <prematch>alert Protection Name: </prematch>
  <regex offset="after_prematch">(\.+); Severity: (\d+);</regex>
  <order>url,status</order>
</decoder>


<!--
REDIRECT
...
-->


<!--
SYSTEM ALERT
...
-->

If you have questions with a specific decoder, just post it here.

To make useful decoders for the community, you should:

   - Add the version of your checkpoint at the begging of the file.
   - Use a standard log format: are you using the default log format of 
   checkpoint?. If not, you should use it or at least, use the syslog 
   standard. In this way, the decoders will work for other users.
   - Provide log samples for each decoder: I usually paste the log as 
   comments in the decoders.

If you don't mind, when you have the decoders working, you could send them 
to our ruleset repositoy <https://github.com/wazuh/ossec-rules> and to 
ossec-hids <https://github.com/ossec/ossec-hids>.

Also, you could use plugin decoders 
<https://github.com/wazuh/ossec-wazuh/tree/master/src/analysisd/decoders/plugins>
 
instead of standard decoders. Plugin decoders ara coded in c and it is 
useful with complex logs (like firewalls).

I hope it helps.
Regards.

On Wednesday, August 17, 2016 at 2:38:47 PM UTC+2, Fredrik wrote:
>
> Hi Jesus!
>
>
> Hope you have had a nice summer so far :) I'm revisiting this decoder 
> with, what I hoped would be, a fresh (rested) pair of eyes ;) 
> Unfortunately, I realize I still have trouble sorting this one out in an 
> efficient manner. I was hoping I could ask you for a few additional 
> pointers especially regarding how to best extract the relevant information 
> from all five types of messages (outlined below). My current challenge is 
> that the 'catch all' parent decoder and allow-block-child, result in events 
> of types redirect/alert/system alert not be parsed completely i.e. 
> information like action/src/dst/message not being extracted. I have 
> attacked the problem from the few angles I can think of, but have come up 
> short :(
>
> Note: All messages except "System Alert" now share a commonality in the 
> hostname which is the active node in the cluster, possible values being 
> st4600fw01n1 or st4600fw01n2 . Previously (in thread) you showed me how the 
> actions could be used in parent decoder <prematch>^redirect \p|^prevent 
> \p|^allow \p|^block \p|^mail System Alert|\S+ alert Protection 
> Name:</prematch>.
>
> - Should I use the hostname as the matching criteria for my parent decoder 
> and group these four events together whilst creating a separate decoder for 
> System Alert? 
> - How would you then suggest I go about extracting the information 
> action/srcip/dstip/url/extra data for the for types of messages in this 
> 'group' using child decoders?
>
> BLOCK
> Jun  2 13:24:13 st4600fw01n1 block <eth6 mail src: 192.168.71.151; dst: 
> 54.164.78.72; proto: tcp; bytes: 1845; sent_bytes: 749; received_bytes: 
> 1096; app_id: 1347922162; browse_time: ******; Suppressed logs: 7; 
> Referrer_self_uid: ******; Referrer_Parent_uid: ******; product: URL 
> Filtering; service: http; s_port: 51096; product_family: Network;
>
> Jun  2 13:24:54 st4600fw01n1 block <eth6 mail src: 192.168.71.151; dst: 
> 54.164.78.72; proto: tcp; bytes: 11122; sent_bytes: 4494; received_bytes: 
> 6628; app_id: 1347922162; browse_time: ******; Referrer_self_uid: ******; 
> product: URL Filtering; service: http; s_port: 51096; product_family: 
> Network;
>
> Jun  2 13:31:57 st4600fw01n1 block <eth6 mail src: 192.168.71.3; dst: 
> 152.115.75.210; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
> 1875144601; app_category: ******; matched_category: ******; app_properties: 
> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
> web_client_type: Other: Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; 
> Touch; rv:11.0) like Gecko; web_server_type: Other: nginx; resource: 
> http://adx.adform.net/adx/?rp=3&pv=1&bWNyPWhiX2FkaWQ6MmIwZmQyMDc0OTllYTEmZHByPTQuMjA2NjQmbWt2PWhiX2JpZGRlcjpydWJpY29uJm1rdz12ZWN0dXJhJTJDZmFzdGlnaGV0ZXIlMkNhYiUyQzU1NjkwMzA1ODcmbWlkPTExODY4NQ&bWNyPWhiX2FkaWQ6MWEwNDNmY2MyNjk2MTk4JmRwcj04LjMwODk2OSZta3Y9aGJfYmlkZGVyOnJ1Ymljb24mbWt3PXZlY3R1cmElMkNmYXN0aWdoZXRlciUyQ2FiJTJDNTU2OTAzMDU4NyZtaWQ9MTE4Njg0&callback=_adform_cb_1464866991419_10159400672628005;
>  
> proxy_src_ip: 192.168.71.3; product: URL Filtering; service: http; s_port: 
> 51311; product_family: Network;
>
>
> ALLOW
> Jun  2 13:50:15 st4600fw01n1 allow <eth6 mail src: 192.168.99.11; dst: 
> 107.170.204.55; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
> 60520086; app_category: ******; matched_category: ******; app_properties: 
> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
> app_sig_id: 60520086:4; proxy_src_ip: 192.168.99.11; product: Application 
> Control; service: https; s_port: 54159; product_family: Network;
>
> Jun  2 13:59:05 st4600fw01n1 allow <eth1 mail src: 192.168.99.11; dst: 
> 89.208.212.2; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
> 10063753; app_category: ******; matched_category: ******; app_properties: 
> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
> web_client_type: Chrome; web_server_type: Microsoft-IIS; app_sig_id: 
> 10063753:5; resource: http://www.aliveproxy.com/; proxy_src_ip: 
> 192.168.99.11; product: Application Control; service: http; s_port: 54473; 
> product_family: Network;
>
>
> ALERT
> May 31 08:05:18 > st4600fw01n1 alert Protection Name: TCP Urgent Data 
> Enforcement; Severity: 0; Confidence Level: 0; protection_id: 
> tcp_block_urg_bit_enable; SmartDefense Profile: Recommended_Protection; 
> Performance Impact: 0; Protection Type: settings; Attack Info: TCP segment 
> with urgent pointer (no data). Urgent data indication was stripped. Please 
> refer to sk36869.; attack: Streaming Engine: TCP Urgent Data Enforcement; 
> Total logs: 8; Suppressed logs: 7; proto: tcp; dst: 52.22.193.162; src: 
> 192.168.10.204; product: SmartDefense; service: http; s_port: 50869; 
> FollowUp: Not Followed; product_family: Network;
>
> May 31 17:51:04 > st4600fw01n1 alert Protection Name: TCP Urgent Data 
> Enforcement; Severity: 0; Confidence Level: 0; protection_id: 
> tcp_block_urg_bit_enable; SmartDefense Profile: Recommended_Protection; 
> Performance Impact: 0; Protection Type: settings; rule: 21; rule_uid: 
> {3F67BCCB-8087-4974-95FA-F4A4FF466D49}; rule_name: #name; Attack Info: TCP 
> segment with urgent pointer (no data). Urgent data indication was stripped. 
> Please refer to sk36869.; attack: Streaming Engine: TCP Urgent Data 
> Enforcement; Total logs: 24; Suppressed logs: 23; proto: tcp; dst: 
> 54.239.168.11; src: 192.168.10.204; product: SmartDefense; service: http; 
> s_port: 60324; FollowUp: Not Followed; product_family: Network;
>
> Aug 17 12:37:14 > st4600fw01n1 alert Protection Name: TCP Urgent Data 
> Enforcement; Severity: 0; Confidence Level: 0; protection_id: 
> tcp_block_urg_bit_enable; SmartDefense Profile: Recommended_Protection; 
> Performance Impact: 0; Protection Type: settings; rule: 23; rule_uid: 
> {3F67BCCB-8087-4974-95FA-F4A4FF466D49}; rule_name: #name; Attack Info: TCP 
> segment with urgent pointer (no data). Urgent data indication was stripped. 
> Please refer to sk36869.; attack: Streaming Engine: TCP Urgent Data 
> Enforcement; Total logs: 11; Suppressed logs: 10; proto: tcp; dst: 
> 80.251.201.102; src: 172.18.46.230; product: SmartDefense; service: https; 
> s_port: 57991; FollowUp: Not Followed; product_family: Network;
>
> Aug 17 04:33:21 > st4600fw01n1 alert Protection Name: Packet Sanity; 
> Severity: 2; Confidence Level: 5; protection_id: PacketSanity; SmartDefense 
> Profile: Recommended_Protection; Performance Impact: 1; Industry Reference: 
> CAN-2002-1071; Protection Type: anomaly; Attack Info: Invalid TCP packet - 
> source / destination port 0; attack: Malformed Packet; Total logs: 3; 
> Suppressed logs: 2; proto: tcp; dst: 80.169.184.240; src: 185.65.132.121; 
> product: SmartDefense; FollowUp: Not Followed; product_family: Network;
>
>
> REDIRECT
> Jun  2 13:54:09 st4600fw01n1 redirect <eth1 alert web_client_type: Chrome; 
> resource: 
> http://sc1.checkpoint.com/za/images/threatwiki/pages/TestAntiBotBlade.html; 
> src: 192.168.99.11; dst: 172.226.217.148; proto: tcp; session_id: 
> {0x57501e61,0x1001b,0xc50d2e0a,0xc0000000}; Protection name: Check Point - 
> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
> Level: 5; severity: 2; malware_action: Communication with C&C site; 
> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.99.11; scope: 
> 192.168.99.11; product: Anti Malware; service: http; s_port: 54402;
>
> SYSTEM ALERT
> May 31 21:31:58 sto-fwm03 mail System Alert message: A Firewall Policy has 
> been successfully installed on st4600fw01n1; Object: st4600fw01n1; Event: 
> Change; Parameter: policy_time; Condition: changes Tue May 31 14:44:13 
> 2016; Current value: Tue May 31 21:04:34 2016; product: System Monitor; 
> product_family: Network;
>
> I realize I'm pushing my luck here! You have done more than enough to set 
> me off in the right direction, and it might just be that I should work up 
> my skills on simpler messages. However, hoping that the concepts you share 
> on creating parent/child decoders is useful to the rest of the community. 
>
> Best regards,
> Fredrik 
>
>
> On Friday, April 15, 2016 at 6:28:22 PM UTC+2, Jesus Linares wrote:
>>
>> Hi Fredrik,
>>
>> It is good progress. You can capture all events with:
>>
>> <decoder name="Checkpoint-test">
>>   <prematch>^redirect \p|^prevent \p|^allow \p|^block \p|^mail System 
>> Alert|\S+ alert Protection Name:</prematch>
>>   <type>firewall</type>
>> </decoder>
>>
>>
>> I know... It is not very elegant, but it controls all your events. Also, 
>> you can add a tag in the beginning of the log (by the firewall settings or 
>> with *rsyslog*) and the decoder will be vey easy:
>>
>> Logs:
>> *FredikFirewall *Apr 15 12:23:16 > st4600fw01n1 alert Protection Name: 
>> TCP Urgent Data Enforcement; Severity: 0; Confidence Level: 0; 
>> protection_id: tcp_block_urg_bit_enable; SmartDefense Profile: 
>> Recommended_Protection; Performance Impact: 0; Protection Type: settings; 
>> rule: 20; rule_uid: {3F67BCCB-8087-4974-95FA-F4A4FF466D49}; rule_name: 
>> #sample; 
>> Attack Info: TCP segment with urgent pointer (no data). Urgent data 
>> indication was stripped. Please refer to sk36869.; attack: Streaming 
>> Engine: TCP Urgent Data Enforcement; Total logs: 3; Suppressed logs: 2; 
>> proto: tcp; dst: 104.16.65.50; src: 192.168.10.204; product: SmartDefense; 
>> service: https; s_port: 56814; FollowUp: Not Followed; product_family: 
>> Network;
>>
>>
>>
>> Decoder:
>> <decoder name="Checkpoint-test">
>>   <prematch>^FredikFirewall </prematch>
>>   <type>firewall</type>
>> </decoder>
>>
>>
>> Regards,
>> Jesus Linares.
>>
>>
>>
>> On Friday, April 15, 2016 at 3:47:17 PM UTC+2, Fredrik wrote:
>>>
>>> Hello Jesus!
>>>
>>>
>>> Story continues. Just wanted to let you know that I have been able, with 
>>> help, to unify ALL the messages for easier handling in OSSEC. Thing is now 
>>> that the hostname is extracted automagically (by OSSEC) from the message 
>>> and I guess can't be used for my prematch, or? Ossec-logtest will treat the 
>>> hostname as part of the header and start the 'Log:' section with e.g. 
>>>
>>> block <eth6 mail src: 10.46.7.196; dst: 37.157.4.16; protocol     ...
>>>
>>> How would you tackle this? Right a prematch with all operative words 
>>> (actions) that is used with the messages I'm interested in (e.g. 
>>> ^allow|^block|^prevent|^redirect)? In my scenario this shouldn't conflict 
>>> with other type of messages. I'm guessing that you Ossec-pros will have 
>>> options and better alternative though ;) I would also like to match the 
>>> decoder regardless of which node in the firewall cluster is the source of 
>>> the event? I The two possibilities are st4600fw01n1 and st4600fw01n2 .
>>>
>>> Here are more message samples:
>>>
>>> pr 15 14:41:53 st4600fw01n1 allow <eth6 mail src: 192.168.5.133; dst: 
>>> 216.131.91.92; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
>>> 60461422; app_category: ******; matched_category: ******; app_properties: 
>>> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
>>> web_client_type: Chrome; web_server_type: Apache; app_sig_id: 60461422:1; 
>>> resource: 
>>> http://strongvpn.com/difference_between_proxy_and_vpn.html?utm_source=adwords&utm_medium=sem&gclid=Cj0KEQjwosK4BRCYhsngx4_SybcBEiQAowaCJTFp6qNVmL7E-BhfeTkQouJTwpHN5v1wslK79jD62k4aAqBB8P8HAQ;
>>>  
>>> proxy_src_ip: 192.168.5.133; product: Application Control; service: http; 
>>> s_port: 59319; product_family: Network;
>>>
>>> Apr 15 14:21:37 st4600fw01n1 redirect <eth1 alert web_client_type: 
>>> Chrome; resource: 
>>> http://sc1.checkpoint.com/za/images/threatwiki/pages/TestAntiBotBlade.html; 
>>> src: 192.168.5.133; dst: 184.31.90.152; proto: tcp; session_id: 
>>> {0x5710dcd1,0x10002,0xc50d2e0a,0xc0000000}; Protection name: Check Point - 
>>> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
>>> Level: 5; severity: 2; malware_action: Communication with C&C site; 
>>> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
>>> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
>>> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.5.133; scope: 
>>> 192.168.5.133; product: Anti Malware; service: http; s_port: 57878;
>>>
>>> Apr 15 05:35:51 st4600fw01n1 prevent <eth6 alert src: 82.221.102.34; 
>>> dst: 192.168.99.4; proto: tcp; session_id: 
>>> {0x57106197,0x10003,0xc50d2e0a,0xc0000001}; Protection name: 
>>> Trojan.Win32.HackerDefender.C; malware_family: HackerDefender; Source OS: 
>>> Solaris; Confidence Level: 5; severity: 4; malware_action: Malicious 
>>> network activity; rule_uid: {25157EEE-C09C-4FE0-A872-E0A1486526B8}; 
>>> rule_name: #extweb; Protection Type: protection; malware_rule_id: 
>>> {000000CE-00A4-0046-9658-621EA5468654}; protection_id: 000043FBC; log_id: 
>>> 2; scope: 192.168.99.4; product: Anti Malware; service: http; s_port: 49228;
>>>
>>> Apr 15 14:13:17 st4600fw01n1 block <eth6 mail src: 192.168.7.196; dst: 
>>> 37.157.2.24; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
>>> 1875144601; app_category: ******; matched_category: ******; app_properties: 
>>> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
>>> web_client_type: Chrome; web_server_type: Other: nginx; resource: 
>>> http://adx.adform.net/adx/?rp=3&pv=1&bWlkPTk3ODMyJmN0dXJsPWh0dHA6Ly9mdXNpb24uYm9ubmllcnRpZHNrcmlmdGVyLnNlL2V2ZW50L2ZsaXlmL2J0LmVrb25vbWkucGFmLnJvcy8xNDc3OTkyNzcvY2xpY2s_dXJsPQ&bWlkPTk3ODMxJmN0dXJsPWh0dHA6Ly9mdXNpb24uYm9ubmllcnRpZHNrcmlmdGVyLnNlL2V2ZW50L2V0YnN3L2J0LmVrb25vbWkucGFmLnJvcy8xNDc3OTkyNzAvY2xpY2s_dXJsPQ&bWlkPTk3ODI5JmN0dXJsPWh0dHA6Ly9mdXNpb24uYm9ubmllcnRpZHNrcmlmdGVyLnNlL2V2ZW50L3FmdWh5L2J0LmVrb25vbWkucGFmLnJvcy8xNDc3OTkyNTYvY2xpY2s_dXJsPQ&callback=_adform_cb_1460722287088_3438587873323349;
>>>  
>>> proxy_src_ip: 192.168.7.196; product: URL Filtering; service: http; s_port: 
>>> 51190; product_family: Network;
>>>
>>> Apr 15 11:16:05 st4600fw01n1 block <eth6 mail src: 192.168.8.67; dst: 
>>> 64.207.139.185; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
>>> 3723664659; app_category: ******; matched_category: ******; app_properties: 
>>> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
>>> web_client_type: Chrome; web_server_type: Apache; resource: 
>>> http://cdn.wibiya.com/Toolbars/dir_0650/Toolbar_650079/Loader_650079.js; 
>>> proxy_src_ip: 192.168.8.67; product: URL Filtering; service: http; s_port: 
>>> 61907; product_family: Network;
>>>
>>> The two outliers now are the messages below. Not quite sure how to 
>>> handle them, but two additional decoders seem required, At least I'm down 
>>> to two outliers and not a whole bunch of exceptions as previously :) :) 
>>> What would be your take on how to treat these two?
>>>
>>> Mar  7 13:07:53 sto-fwm03 mail System Alert message: A Firewall Policy 
>>> has been successfully installed on st4600fw01n1; Object: st4600fw01n1; 
>>> Event: Change; Parameter: policy_time; Condition: changes Mon Mar  7 
>>> 13:03:42 2016; Current value: Mon Mar  7 13:08:48 2016; product: Test 
>>> Monitor; product_family: Network;
>>>
>>> Apr 15 12:23:16 > st4600fw01n1 alert Protection Name: TCP Urgent Data 
>>> Enforcement; Severity: 0; Confidence Level: 0; protection_id: 
>>> tcp_block_urg_bit_enable; SmartDefense Profile: Recommended_Protection; 
>>> Performance Impact: 0; Protection Type: settings; rule: 20; rule_uid: 
>>> {3F67BCCB-8087-4974-95FA-F4A4FF466D49}; rule_name: #sample; Attack Info: 
>>> TCP segment with urgent pointer (no data). Urgent data indication was 
>>> stripped. Please refer to sk36869.; attack: Streaming Engine: TCP Urgent 
>>> Data Enforcement; Total logs: 3; Suppressed logs: 2; proto: tcp; dst: 
>>> 104.16.65.50; src: 192.168.10.204; product: SmartDefense; service: https; 
>>> s_port: 56814; FollowUp: Not Followed; product_family: Network;
>>>
>>> Best regards,
>>> Fredrik 
>>>
>>>
>>> On Friday, April 1, 2016 at 1:18:17 PM UTC+2, Jesus Linares wrote:
>>>
>>> Hi Fredrik,
>>>
>>> here an example of decoding allow/block events (with the option 
>>> *after_regex*):
>>>
>>>
>>> <!--
>>> pattern:
>>> Mar 29 09:04:21 127.0.0.1 Mar 29 8:52:29 st4600fw01n1 Text
>>> -->
>>> <decoder name="Checkpoint-test">
>>>   <prematch>^\w\w\w \d+ \d+:\d+:\d+ \S+ </prematch>
>>>   <type>firewall</type>
>>> </decoder>
>>>
>>>
>>> <!--
>>> Mar 30 09:03:56 127.0.0.1 Mar 30 8:52:05 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; bytes: 2396; sent_bytes: 
>>> 1180; received_bytes: 1216; app_id: 10063753; browse_time: ******; 
>>> Suppressed logs: 19; Referrer_self_uid: ******; product: Application 
>>> Control; service: http; s_port: 64136; product_family: Network;
>>> -->
>>> <decoder name="Checkpoint-block-allow">
>>>   <parent>Checkpoint-test</parent>
>>>   <prematch offset="after_parent">^block|^allow</prematch>
>>>   <regex offset="after_parent">(\w+) \S+ \S+ src: (\d+.\d+.\d+.\d+); 
>>> dst: (\d+.\d+.\d+.\d+)</regex>
>>>   <order>action,srcip,dstip</order>
>>> </decoder>
>>>
>>>
>>> <!--
>>> Checkpoint-block-allow: extra fields: resource and product
>>> Mar 30 09:03:35 127.0.0.1 Mar 30 8:51:43 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 10063753; app_category: ******; matched_category: 
>>> ******; app_properties: ******; app_risk: ******; app_rule_id: ******; 
>>> app_rule_name: ******; web_client_type: Chrome; web_server_type: 
>>> Microsoft-IIS; app_sig_id: 10063753:5; resource: 
>>> http://www.aliveproxy.com/; proxy_src_ip: 192.168.5.133; product: 
>>> Application Control; service: http; s_port: 64136; product_family: Network;
>>> -->
>>> <decoder name="Checkpoint-block-allow">
>>>   <parent>Checkpoint-test</parent>
>>>   <regex offset="after_regex">resource: (\S+); proxy_src_ip: \S+; 
>>> product: (\.+); </regex>
>>>   <order>url, extra_data</order>
>>> </decoder>
>>>
>>>
>>> I recommend you configure all your checkpoint devices with the same log 
>>> format. If you can't you could use *several parents*:
>>>
>>> <!--
>>> pattern:
>>> Mar 29 09:04:21 127.0.0.1 Mar 29 8:52:29 st4600fw01n1 Text
>>> -->
>>> <decoder name="Checkpoint-test">
>>>   <prematch>^\w\w\w \d+ \d+:\d+:\d+ \S+ </prematch>
>>>   <type>firewall</type>
>>> </decoder>
>>>
>>>
>>> <!--
>>> pattern:
>>> Mar 30 10:04:39 127.0.0.1 redirect <eth1 alert web_client_type: Chrome; 
>>> resource: 
>>> http://sc1.checkpoint.com/za/images/threatwiki/pages/TestAntiBotBlade.html; 
>>> src: 192.168.5.133; dst: 172.226.217.148; proto: tcp; session_id: 
>>> {0x56fb8896,0x10009,0xc50d2e0a,0xc0000001}; Protection name: Check Point - 
>>> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
>>> Level: 5; severity: 2; malware_action: Communication with C&C site; 
>>> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
>>> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
>>> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.5.133; scope: 
>>> 192.168.5.133; product: Anti Malware; service: http; s_port: 49244;
>>>
>>>
>>> Mar 29 20:13:14 127.0.0.1 prevent <eth1 alert web_client_type: Microsoft 
>>> IE; resource: 
>>> http://www.bing.com/fd/ls/GLinkPing.aspx?IG=9A0044152B65437D93F87086B9E730D9&&ID=SERP,5118.1&url=http://sc1.checkpoint.com/z...;
>>>  
>>> src: 192.168.5.133; dst: 204.79.197.200; proto: tcp; session_id: 
>>> {0x56fac5ba,0x10004,0xc50d2e0a,0xc0000000}; Protection name: Check Point - 
>>> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
>>> Level: 5; severity: 2; malware_action: Communication with C&C site; 
>>> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
>>> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
>>> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.5.133; scope: 
>>> 192.168.5.133; product: Anti Malware; service: http; s_port: 63119;
>>> -->
>>> <decoder name="Checkpoint-test">
>>>   <prematch>^redirect \p|^prevent \p</prematch>
>>>   <type>firewall</type>
>>> </decoder>
>>>
>>>
>>> <!--
>>> Mar 30 09:03:56 127.0.0.1 Mar 30 8:52:05 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; bytes: 2396; sent_bytes: 
>>> 1180; received_bytes: 1216; app_id: 10063753; browse_time: ******; 
>>> Suppressed logs: 19; Referrer_self_uid: ******; product: Application 
>>> Control; service: http; s_port: 64136; product_family: Network;
>>> -->
>>> <decoder name="Checkpoint-block-allow">
>>>   <parent>Checkpoint-test</parent>
>>>   <prematch offset="after_parent">^block|^allow</prematch>
>>>   <regex offset="after_parent">(\w+) \S+ \S+ src: (\d+.\d+.\d+.\d+); 
>>> dst: (\d+.\d+.\d+.\d+)</regex>
>>>   <order>action,srcip,dstip</order>
>>> </decoder>
>>>
>>>
>>> <!--
>>> Checkpoint-block-allow: extra fields: resource and product
>>> Mar 30 09:03:35 127.0.0.1 Mar 30 8:51:43 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 10063753; app_category: ******; matched_category: 
>>> ******; app_properties: ******; app_risk: ******; app_rule_id: ******; 
>>> app_rule_name: ******; web_client_type: Chrome; web_server_type: 
>>> Microsoft-IIS; app_sig_id: 10063753:5; resource: 
>>> http://www.aliveproxy.com/; proxy_src_ip: 192.168.5.133; product: 
>>> Application Control; service: http; s_port: 64136; product_family: Network;
>>> -->
>>> <decoder name="Checkpoint-block-allow">
>>>   <parent>Checkpoint-test</parent>
>>>   <regex offset="after_regex">resource: (\S+); proxy_src_ip: \S+; 
>>> product: (\.+); </regex>
>>>   <order>url, extra_data</order>
>>> </decoder>
>>>
>>>
>>> P.S. My name is Jesus, not Jose ;).
>>>
>>> Regards,
>>> Jesus Linares.
>>>
>>>
>>>
>>> On Wednesday, March 30, 2016 at 10:28:09 AM UTC+2, Fredrik wrote:
>>>
>>> Hi Jose,
>>>
>>>
>>> I got some help to sort out the different timestamps (format) and all 
>>> log types now use "Jan 27 09:41:01".  You asked about the firewall, 
>>> this particular one is a Checkpoint currently running version R77.20.
>>>
>>> The remaining question, that might be of interest to others on the path 
>>> to OSSEC mastery ;) ;) is how to handle messages with different "format" 
>>> coming from the same host. I have collected a bunch of messages that I 
>>> would like to be able to decode, but I'm not sure about the most efficient 
>>> way to build the parent/child decoder tree for this. 
>>>
>>> With the help received previously in this thread, I currently have the 
>>> following in my local_decoder and I'm experimenting with different addition 
>>> - none of which is working so far ;) 
>>>
>>> <decoder name="Checkpoint">
>>>   <prematch>^\w+ \d+ \d+:\d+:\d+ st4600fw01n\d</prematch>
>>>   <type>firewall</type>
>>> </decoder>
>>>
>>> <decoder name="Checkpoint-alert">
>>>   <parent>Checkpoint</parent>
>>>   <regex offset="after_parent">(\w+) \p\w+ \w+ 
>>> src:\s(\d+.\d+.\d+.\d+);\sdst:\s(\d+.\d+.\d+.\d+)</regex>
>>>   <order>action,srcip,dstip</order>
>>> </decoder>
>>>
>>> <decoder name="Checkpoint-alert">
>>>   <parent>Checkpoint</parent>
>>>   <regex offset="after_regex">\.*resource: (\.*);\.*product: 
>>> (\.*);</regex>
>>>   <order>url,extra_data</order>
>>> </decoder>
>>>
>>>
>>> Below is a collection of syslog messages recieved from the firewall 
>>> where the first section is currently decoded using the local_decoder above:
>>>
>>>
>>> Mar 29 10:09:40 127.0.0.1 Mar 29 9:57:49 st4600fw01n1 block <eth6 mail 
>>> src: 192.168.7.206; dst: 54.72.9.51; proto: tcp; bytes: 4962; sent_bytes: 
>>> 530; received_bytes: 4432; app_id: 3404393449; browse_time: ******; 
>>> Suppressed logs: 1; Referrer_self_uid: ******; product: URL Filtering; 
>>> service: http; s_port: 54693; product_family: Network;
>>>
>>> Mar 29 20:57:00, st4600fw01n1, allow <eth1 mail src: 192.168.5.133; dst: 
>>> 89.208.212.2; proto: tcp; appi_name: ******; app_desc: ******; app_id: 
>>> 10063753; app_category: ******; matched_category: ******; app_properties: 
>>> ******; app_risk: ******; app_rule_id: ******; app_rule_name: ******; 
>>> web_client_type: Microsoft IE; web_server_type: Microsoft-IIS; app_sig_id: 
>>> 10063753:5; resource: http://aliveproxy.com/; proxy_src_ip: 
>>> 192.168.5.133; product: Application Control; service: http; s_port: 63867; 
>>> product_family: Network;
>>>
>>> Mar 30 09:04:14 127.0.0.1 Mar 30 8:52:22 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 23.67.132.180; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 10003219; app_category: ******; matched_category: 
>>> ******; app_properties: ******; app_risk: ******; app_rule_id: ******; 
>>> app_rule_name: ******; app_sig_id: 10003219:4; proxy_src_ip: 192.168.5.133; 
>>> product: Application Control; service: https; s_port: 64166; 
>>> product_family: Network;
>>>
>>> Mar 30 09:03:56 127.0.0.1 Mar 30 8:52:05 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; bytes: 2396; sent_bytes: 
>>> 1180; received_bytes: 1216; app_id: 10063753; browse_time: ******; 
>>> Suppressed logs: 19; Referrer_self_uid: ******; product: Application 
>>> Control; service: http; s_port: 64136; product_family: Network;
>>>
>>> Mar 30 09:03:35 127.0.0.1 Mar 30 8:51:43 st4600fw01n1 allow <eth6 mail 
>>> src: 192.168.5.133; dst: 89.208.212.2; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 10063753; app_category: ******; matched_category: 
>>> ******; app_properties: ******; app_risk: ******; app_rule_id: ******; 
>>> app_rule_name: ******; web_client_type: Chrome; web_server_type: 
>>> Microsoft-IIS; app_sig_id: 10063753:5; resource: 
>>> http://www.aliveproxy.com/; proxy_src_ip: 192.168.5.133; product: 
>>> Application Control; service: http; s_port: 64136; product_family: Network;
>>>
>>> Mar 29 09:04:21 127.0.0.1 Mar 29 8:52:29 st4600fw01n1 block <eth6 mail 
>>> src: 192.168.5.136; dst: 37.157.4.15; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 1875144601; app_category: ******; 
>>> matched_category: ******; app_properties: ******; app_risk: ******; 
>>> app_rule_id: ******; app_rule_name: ******; web_client_type: Other: 
>>> Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like 
>>> Gecko; web_server_type: Other: nginx; resource: 
>>> http://adx.adform.net/adx/?rp=3&pv=1&bWlkPTE1NzU3NiZybmQ9ODU1M2JjNGMtMmY2MC00YzVjLWFhMzAtYmY5NzZlNDllZDNk&callback=_adform_cb_1459234242747_7491414591872548;
>>>  
>>> proxy_src_ip: 192.168.5.136; product: URL Filtering; service: http; s_port: 
>>> 54051; product_family: Network;
>>>
>>> Mar 29 09:06:12 127.0.0.1 Mar 29 8:54:21 st4600fw01n1 block <eth6 mail 
>>> src: 192.168.6.157; dst: 37.157.4.15; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 1875144601; app_category: ******; 
>>> matched_category: ******; app_properties: ******; app_risk: ******; 
>>> app_rule_id: ******; app_rule_name: ******; web_client_type: Other: 
>>> Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like 
>>> Gecko; web_server_type: Other: nginx; resource: 
>>> http://adx.adform.net/adx/?rp=3&pv=1&bWlkPTk1NzI4&callback=_adform_cb_1459234355177_008705563130792681;
>>>  
>>> proxy_src_ip: 192.168.6.157; product: URL Filtering; service: http; s_port: 
>>> 51746; product_family: Network;
>>>
>>> Mar 29 08:37:54 127.0.0.1 Mar 29 8:26:03 st4600fw01n1 block <eth6 mail 
>>> src: 192.168.6.157; dst: 152.115.75.210; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 1875144601; app_category: ******; 
>>> matched_category: ******; app_properties: ******; app_risk: ******; 
>>> app_rule_id: ******; app_rule_name: ******; web_client_type: Other: 
>>> Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like 
>>> Gecko; web_server_type: Other: nginx; resource: 
>>> http://adx.adform.net/adx/?rp=3&pv=1&bWlkPTk3ODMyJmN0dXJsPWh0dHA6Ly9mdXNpb24uYm9ubmllcnRpZHNrcmlmdGVyLnNlL2V2ZW50L3VlZXVqL2J0LmVrb25vbWkucGFmLnJvcy8xNDc3OTkyNzcvY2xpY2s_dXJsPQ&bWlkPTk3ODMxJmN0dXJsPWh0dHA6Ly9mdXNpb24uYm9ubmllcnRpZHNrcmlmdGVyLnNlL2V2ZW50L3lydmd2L2J0LmVrb25vbWkucGFmLnJvcy8xNDc3OTkyNzAvY2xpY2s_dXJsPQ&callback=_adform_cb_1459232656248_7681010355476278;
>>>  
>>> proxy_src_ip: 192.168.6.157; product: URL Filtering; service: http; s_port: 
>>> 51104; product_family: Network;
>>>
>>> Mar 29 08:35:17 127.0.0.1 Mar 29 8:23:24 st4600fw01n1 block <eth6 mail 
>>> src: 192.168.6.157; dst: 152.115.75.199; proto: tcp; appi_name: ******; 
>>> app_desc: ******; app_id: 1875144601; app_category: ******; 
>>> matched_category: ******; app_properties: ******; app_risk: ******; 
>>> app_rule_id: ******; app_rule_name: ******; web_client_type: Other: 
>>> Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like 
>>> Gecko; web_server_type: Other: nginx; resource: 
>>> http://adx.adform.net/adx/?rp=3&pv=1&bWlkPTk1NzMw&callback=_adform_cb_1459232497393_6046677836175733;
>>>  
>>> proxy_src_ip: 192.168.6.157; product: URL Filtering; service: http; s_port: 
>>> 50904; product_family: Network;
>>>
>>>
>>>
>>>
>>> Mar 30 10:04:39 127.0.0.1 redirect <eth1 alert web_client_type: Chrome; 
>>> resource: 
>>> http://sc1.checkpoint.com/za/images/threatwiki/pages/TestAntiBotBlade.html; 
>>> src: 192.168.5.133; dst: 172.226.217.148; proto: tcp; session_id: 
>>> {0x56fb8896,0x10009,0xc50d2e0a,0xc0000001}; Protection name: Check Point - 
>>> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
>>> Level: 5; severity: 2; malware_action: Communication with C&C site; 
>>> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
>>> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
>>> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.5.133; scope: 
>>> 192.168.5.133; product: Anti Malware; service: http; s_port: 49244;
>>>
>>> Mar 29 20:13:14 127.0.0.1 prevent <eth1 alert web_client_type: Microsoft 
>>> IE; resource: 
>>> http://www.bing.com/fd/ls/GLinkPing.aspx?IG=9A0044152B65437D93F87086B9E730D9&&ID=SERP,5118.1&url=http://sc1.checkpoint.com/z...;
>>>  
>>> src: 192.168.5.133; dst: 204.79.197.200; proto: tcp; session_id: 
>>> {0x56fac5ba,0x10004,0xc50d2e0a,0xc0000000}; Protection name: Check Point - 
>>> Testing Bot; malware_family: Check Point; Source OS: Windows; Confidence 
>>> Level: 5; severity: 2; malware_action: Communication with C&C site; 
>>> rule_uid: {9AF67731-0D35-4117-AF2B-9A47F9396D26}; Protection Type: URL 
>>> reputation; malware_rule_id: {000000CE-00A4-0046-9658-621EA5468654}; 
>>> protection_id: 00233CFEE; log_id: 2; proxy_src_ip: 192.168.5.133; scope: 
>>> 192.168.5.133; product: Anti Malware; service: http; s_port: 63119;
>>>
>>> Mar 30 9:04:59, st4600fw01n1, allow <eth6 mail src: 192.168.5.133; dst: 
>>> 207.244.85.73; proto: tcp; appi_name: ******; app_desc: ******; app_id
>>> : 10064017; app_category: ******; matched_category: ******; 
>>> app_properties: ******; app_risk: 
>>>
>>> ...
>>
>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to